Provectus Kafka-UI 0.4.0-0.7.1 code execution via /api/clusters/local/topics/{topic}/messages
Reporter | Title | Published | Views | Family All 12 |
---|---|---|---|---|
Prion | Code injection | 25 Jan 202421:15 | – | prion |
CVE | CVE-2023-52251 | 25 Jan 202421:15 | – | cve |
Packet Storm | Kafka UI 0.7.1 Command Injection | 20 Feb 202400:00 | – | packetstorm |
Cvelist | CVE-2023-52251 | 25 Jan 202400:00 | – | cvelist |
Vulnrichment | CVE-2023-52251 | 25 Jan 202400:00 | – | vulnrichment |
GithubExploit | Exploit for Code Injection in Provectus Ui | 6 Jan 202411:07 | – | githubexploit |
OSV | CVE-2023-52251 | 25 Jan 202421:15 | – | osv |
0day.today | Kafka UI 0.7.1 Command Injection Exploit | 20 Feb 202400:00 | – | zdt |
Nuclei | Kafka UI 0.7.1 Command Injection | 14 Mar 202408:49 | – | nuclei |
Metasploit | Kafka UI Unauthenticated Remote Command Execution via the Groovy Filter option. | 14 Feb 202420:57 | – | metasploit |
Source | Link |
---|---|
github | www.github.com/BobTheShoplifter/CVE-2023-52251-POC |
packetstormsecurity | www.packetstormsecurity.com/files/177214/Kafka-UI-0.7.1-Command-Injection.html |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo