# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data. | https://github.com/Rubikcuv5/cve-2023-30253 | POC详情 |
2 | Poc for CVE-2023-30253 | https://github.com/04Shivam/CVE-2023-30253-Exploit | POC详情 |
3 | Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection | https://github.com/nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253 | POC详情 |
4 | CVE-2023-30253 PoC | https://github.com/g4nkd/CVE-2023-30253-PoC | POC详情 |
5 | In Dolibarr 17.0.0 with the CMS Website plugin (core) enabled, an authenticated attacker can obtain remote command execution via php code injection bypassing the application restrictions. | https://github.com/dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253 | POC详情 |
6 | An authenticated RCE exploit for Dolibarr ERP/CRM CVE-2023-30253. | https://github.com/andria-dev/DolibabyPhp | POC详情 |
7 | Dolibarr 17.0.0 PHP Code Injection Exploit | https://github.com/bluetoothStrawberry/CVE-2023-30253 | POC详情 |