compop.ca 3.5.3 Arbitrary code Execution
compop.ca 3.5.3餐馆管理系统存在漏洞,利用Unix时间戳参数"ts"进行身份验证,导致任意代码执行。 2025-5-27 17:38:35 Author: cxsecurity.com(查看原文) 阅读量:20 收藏

# Exploit Title: compop.ca 3.5.3 - Arbitrary code Execution # Google Dork: Terms of Use inurl:compop.vip # Date: 22/12/2024 # Exploit Author: dmlino # Vendor Homepage: https://www.compop.ca/ # Version: 3.5.3 # CVE : CVE-2024-48445 The restaurant management system implements authentication using a Unix timestamp parameter ("ts") in the URL. This implementation is vulnerable to manipulation as it relies solely on time-based validation without proper authentication mechanisms. Technical Details: The application uses a URL parameter "ts" which accepts a Unix timestamp value. Steps: 1. Find a vulnerable restaurant. 2. Get the current time in the UNIX format: Linux: $date +%s Windows Powershell: [int](Get-Date -UFormat %s -Millisecond 0) 3. Replace parameter in url with the new value


文章来源: https://cxsecurity.com/issue/WLB-2025050051
如有侵权请联系:admin#unsafe.sh