A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/94fzb/zrlog/issues/115 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:10:17.348Z
Reserved: 2021-11-22T00:00:00
Link: CVE-2021-44093

No data.

Status : Modified
Published: 2021-11-28T21:15:08.140
Modified: 2024-11-21T06:30:21.610
Link: CVE-2021-44093

No data.