Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2020-15227

Description

Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.

POC

Reference

No PoCs from references.

Github

- https://github.com/20142995/nuclei-templates

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/Langriklol/CVE-2020-15227

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NetW0rK1le3r/awesome-hacking-lists

- https://github.com/VottusCode/cve-2020-15227

- https://github.com/anquanscan/sec-tools

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/filipsedivy/CVE-2020-15227

- https://github.com/filipsedivy/filipsedivy

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hu4wufu/CVE-2020-15227

- https://github.com/huike007/penetration_poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/readloud/Awesome-Stars

- https://github.com/soosmile/POC

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/xuetusummer/Penetration_Testing_POC