| 概要 | mpGabinet is vulnerable to Remote Command Execution. An authorized user with access to the application and direct access to the backend database can achieve system command execution by uploading an attachment and modifying its storage path in the database to reference an attacker-controlled remote network resource. Alternatively, it is possible to use a previously uploaded file and change its reference. When the application processes the attachment, and a user tries to open it, the referenced resource is executed by the system. This issue affects mpGabinet version 23.12.19 and below. |
|---|---|
| 公表日 | 2026年4月28日23:16 |
| 登録日 | 2026年4月29日4:08 |
| 最終更新日 | 2026年4月28日23:16 |