Ajenti 2.1.31 Remote Code Execution
Posted by deepcore on October 31, 2019 – 12:01 pm
This Metasploit module exploits a command injection vulnerability in Ajenti versions 2.1.31 and below. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned.
Post a reply
You must be logged in to post a comment.