Описание
WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2011-10011
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/webid_converter.rb
- https://sourceforge.net/projects/simpleauction
- https://web.archive.org/web/20121024110058/http://www.webidsupport.com/forums/showthread.php?3892
- https://www.exploit-db.com/exploits/17487
- https://www.exploit-db.com/exploits/18934
- https://www.vulncheck.com/advisories/webid-remote-php-code-injection
Связанные уязвимости
WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.