Subscribe via feed.

Ajenti 2.1.31 Remote Code Execution

Posted by deepcore on October 31, 2019 – 12:01 pm

This Metasploit module exploits a command injection vulnerability in Ajenti versions 2.1.31 and below. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.