- Description
- Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- nvd@nist.gov
- CWE-78
- Hype score
- Not currently trending
Billing #TryHackMe Writeup https://t.co/UyqiTbvgCk #new #machine #billing #writeup #tryhackme #magnusBilling #cve-2023-30258 #asterisk #rce #fail2ban-client #sudo https://t.co/51HeWnUG2O
@David_Uton
9 Mar 2025
84 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
YouTube Video Walk Through for TryHackMe room Billing. Video link in first comment⤵️⤵️⤵️🦜🦜 After running an initial scan, you’ll discover a MagnusBilling instance running on port 80. A quick Google search reveals CVE-2023-30258, an unauthenticated Remote Command Execution… ht
@DjalilAyed
9 Mar 2025
82 Impressions
0 Retweets
2 Likes
0 Bookmarks
1 Reply
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:magnussolution:magnusbilling:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5431D799-492A-4081-9BAB-9CA1C25A3A3C",
"versionEndIncluding": "7.3.0",
"versionStartIncluding": "6.0.0"
}
],
"operator": "OR"
}
]
}
]