Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | studio-42/elfinder | unspecified ~ 2.1.58 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | studio-42/elfinder before 2.1.58 contains a remote code execution caused by execution of PHP code in a .phar file, letting attackers execute arbitrary PHP code if the server parses .phar files as PHP, exploit requires server to parse .phar files as PHP. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-23394.yaml | POC Details |
| 2 | Docker container to setup a vulnerable elfinder version on both nginx and apache servers. Can be used to test vulnerability POC | https://github.com/0xnemian/CVE-2021-23394 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet