Skip to content

anldori/CVE-2021-21809

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

CVE-2021-21809 POC

CVE details: A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.

In the below video, I'm going to gain access to Golden Eye 1 OSCP Lab by exploiting this vulnerability with out using Metasploit. Check out GoldenEye 1: https://www.vulnhub.com/entry/goldeneye-1,240/.

Get the revershell by using telnet command, encode it as url format and save it to Path to aspell (Settings/Server/System paths).

2022-12-19.15-58-07.mp4

About

CVE-2021-21809 POC

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages