momo安全漏洞库

多模块数据检索平台

登录 注册
返回列表

CVE-2020-37123: Pinger 1.0 - Remote Code Execution

CVE: CVE-2020-37123
CNVD: 暂无
CNNVD: 暂无
漏洞类型: 命令执行
漏洞等级: 严重
年份: 2026
POC_ID: 暂无
漏洞描述
Pinger 1.0 contains a remote code execution vulnerability that allows attackers to inject shell commands through the ping and socket parameters. Attackers can exploit the unsanitized input in ping.php to write arbitrary PHP files and execute system commands by appending shell metacharacters. [已公开] id: CVE-2020-37123 info: name: Pinger 1.0 - Remote Code Execution author: bswearingen severity: critical description: | Pinger 1.0 contains a remote code execution vulnerability that allows attackers to inject shell commands through the ping and socket parameters. Attackers can exploit the unsanitized input in ping.php to write arbitrary PHP files and execute system commands by appending shell metacharacters. impact: | An unauthenticated attacker can execute arbitrary system commands on the server. remediation: | Remove Pinger or apply input validation to sanitize the ping and socket parameters. reference: - https://www.exploit-db.com/exploits/48323 - https://nvd.nist.gov/vuln/detail/CVE-2020-37123 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-37123 epss-score: 0.09915 epss-percentile: 0.92866 cwe-id: CWE-78 metadata: verified:
影响范围
未知
漏洞详情
登录后可查看漏洞详情。请先 登录注册
漏洞 POC
登录后可查看漏洞 POC。请先 登录注册
修复建议
暂无