Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-31854

EPSS 79.89% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-31854

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Codoforum v5.1 was discovered to contain an arbitrary file upload vulnerability via the logo change option in the admin panel.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Codoforum 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Codoforum是一套基于PHP和MySQL的论坛软件。 Codoforum v5.1版本存在安全漏洞,该漏洞源于通过管理面板中的徽标更改选项发现存在任意文件上传漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-31854

#POC DescriptionSource LinkShenlong Link
1CodoForum v5.1 - File Upload Bypass to RCE (Authenticated) exploit codehttps://github.com/Vikaran101/CVE-2022-31854POC Details
2Codoforum 5.1 contains an arbitrary file upload vulnerability via the logo change option in the admin panel. An attacker can upload arbitrary files to the server, which in turn can be used to make the application execute file content as code. As a result, an attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-31854.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-31854

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-07-07 · 32 CVEs total

CVE-2015-1784WordPress plugin nextgen-galery 代码问题漏洞
CVE-2022-1245Red Hat Keycloak 安全漏洞
CVE-2022-32061Snipe-IT 跨站脚本漏洞
CVE-2021-29281GFI Mail Archiver 代码问题漏洞
CVE-2021-35283atoms183 CMS SQL注入漏洞
CVE-2022-33098Magnolia CMS 跨站脚本漏洞
CVE-2021-31645glFTPd 安全漏洞
CVE-2015-5298Jenkins Plugin Google Login 授权问题漏洞
CVE-2022-32058TP-LINK TL-WR741N和TP-LINK TL-WR742N 安全漏洞
CVE-2022-32056Online Accreditation Management SQL注入漏洞
CVE-2022-32055Nesote Technologies Inout Homestay SQL注入漏洞
CVE-2022-32054Tenda AC10 操作系统命令注入漏洞
CVE-2015-5236icedtea-web 数据伪造问题漏洞
CVE-2022-23744Check Point Endpoint Security Client 安全漏洞
CVE-2021-46825Symantec Advanced Secure Gateway 环境问题漏洞
CVE-2022-32441Hex Rays Ida Pro 缓冲区错误漏洞
CVE-2022-32060Snipe-IT 跨站脚本漏洞
CVE-2015-1785WordPress plugin nextgen-galery 跨站请求伪造漏洞
CVE-2015-3207Red Hat OpenShift 安全漏洞
CVE-2022-25048CWP Panel 操作系统命令注入漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-31854

No comments yet


Leave a comment