Vulnerability Description
Dangerous method exposed which can lead to RCE in qmpass/leadshop v1.4.15 allows an attacker to control the target host by calling any function in leadshop.php via the GET method.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Leadshop | Leadshop | 1.4.15 |
Related Weaknesses (CWE)
References
- https://github.com/qmpaas/leadshop/commit/f27e9ca5c93eaadda1097396b65c234b16186dPatchThird Party Advisory
- https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3ExploitPatchThird Party Advisory
- https://github.com/qmpaas/leadshop/commit/f27e9ca5c93eaadda1097396b65c234b16186dPatchThird Party Advisory
- https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3ExploitPatchThird Party Advisory
FAQ
What is CVE-2022-4136?
CVE-2022-4136 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Dangerous method exposed which can lead to RCE in qmpass/leadshop v1.4.15 allows an attacker to control the target host by calling any function in leadshop.php via the GET method.
How severe is CVE-2022-4136?
CVE-2022-4136 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-4136?
Check the references section above for vendor advisories and patch information. Affected products include: Leadshop Leadshop.