TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Exploit-DB

[webapps] GUnet OpenEclass E-learning platform < 4.2 - Remote Code Execution (RCE)

2026-04-29 · Read original ↗

ATT&CK techniques detected

4 predictions
T1190Exploit Public-Facing Application
68%
“[ webapps ] gunet openeclass e - learning platform < 4. 2 - remote code execution ( rce ) gunet openeclass e - learning platform < 4. 2 - remote code execution ( rce ) # exploit title : gunet openeclass e - learning platform < 4. 2 - remote code execution ( rce ) # date : 2026 - …”
T1539Steal Web Session Cookie
66%
“a session to ensure cookies are handled correctly with requests. session ( ) as session : # ( optional ) initially visit the login page if needed to get a fresh session cookie or any other required tokens session. get ( login _ page _ url ) # post the login credentials response =…”
T1190Exploit Public-Facing Application
60%
“{ green } [ + ] type ' quit ' to exit web shell! { reset } " ) return true else : print ( f " { red } [ x ] failed to upload payload. { reset } " ) print ( f " { red } [ x ] exiting... { reset } " ) return false def main ( ) : parser = argparse. argumentparser ( description = " o…”
T1505.003Web Shell
45%
“{ green } [ + ] type ' quit ' to exit web shell! { reset } " ) return true else : print ( f " { red } [ x ] failed to upload payload. { reset } " ) print ( f " { red } [ x ] exiting... { reset } " ) return false def main ( ) : parser = argparse. argumentparser ( description = " o…”

Summary

GUnet OpenEclass E-learning platform < 4.2 - Remote Code Execution (RCE)