Vulnerability Description
NeDi 1.9C allows an authenticated user to inject PHP code in the System Files function on the endpoint /System-Files.php via the txt HTTP POST parameter. This allows an attacker to obtain access to the operating system where NeDi is installed and to all application data.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nedi | Nedi | 1.9c |
Related Weaknesses (CWE)
References
- https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/ExploitThird Party Advisory
- https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/ExploitThird Party Advisory
FAQ
What is CVE-2021-26753?
CVE-2021-26753 is a vulnerability with a CVSS score of 9.9 (CRITICAL). NeDi 1.9C allows an authenticated user to inject PHP code in the System Files function on the endpoint /System-Files.php via the txt HTTP POST parameter. This allows an attacker to obtain access to th...
How severe is CVE-2021-26753?
CVE-2021-26753 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-26753?
Check the references section above for vendor advisories and patch information. Affected products include: Nedi Nedi.