Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3w97-v426-7jw9

Опубликовано: 31 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

An OS command injection vulnerability exists in WebTester version 5.x via the install2.php installation script. The parameters cpusername, cppassword, and cpdomain are passed directly to shell commands without sanitization. A remote unauthenticated attacker can exploit this flaw by sending a crafted HTTP POST request, resulting in arbitrary command execution on the underlying system with web server privileges.

An OS command injection vulnerability exists in WebTester version 5.x via the install2.php installation script. The parameters cpusername, cppassword, and cpdomain are passed directly to shell commands without sanitization. A remote unauthenticated attacker can exploit this flaw by sending a crafted HTTP POST request, resulting in arbitrary command execution on the underlying system with web server privileges.

EPSS

Процентиль: 99%
0.67205
Средний

9.3 Critical

CVSS4

Дефекты

CWE-78

Связанные уязвимости

nvd
6 месяцев назад

An OS command injection vulnerability exists in WebTester version 5.x via the install2.php installation script. The parameters cpusername, cppassword, and cpdomain are passed directly to shell commands without sanitization. A remote unauthenticated attacker can exploit this flaw by sending a crafted HTTP POST request, resulting in arbitrary command execution on the underlying system with web server privileges.

EPSS

Процентиль: 99%
0.67205
Средний

9.3 Critical

CVSS4

Дефекты

CWE-78