Описание
The get_file_type function in lib/file_content.php in DFLabs PTK 0.1, 0.2, and 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters after an arg1= sequence in a filename within a forensic image.
Ссылки
- Exploit
- PatchVendor Advisory
- Exploit
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:dflabs:ptk:0.1:*:*:*:*:*:*:*
cpe:2.3:a:dflabs:ptk:0.2:*:*:*:*:*:*:*
cpe:2.3:a:dflabs:ptk:1.0:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.0884
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
больше 3 лет назад
The get_file_type function in lib/file_content.php in DFLabs PTK 0.1, 0.2, and 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters after an arg1= sequence in a filename within a forensic image.
EPSS
Процентиль: 92%
0.0884
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-20