![]() ![]() ![]() # Example: python3 exploit.py -u -l admin -p Admin123ĭescription='e107 CMS 2.3.0 - Remote Code Execution (RCE) (Authenticated)' # The contents of the upload "malicious.zip" file must be too long to read to bypass some security measures! # User information with sufficient permissions is required. # Theme page is misconfigured, causing security vulnerability # Includes an endpoint that allows remote access # e107 is a free website content management system # Exploit Author: Halit AKAYDIN (hLtAkydn) # Exploit Title: e107 CMS 2.3.0 - Remote Code Execution (RCE) (Authenticated)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |