Description
WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
Problem types
CWE-94 Improper Control of Generation of Code ('Code Injection')
Product status
*
Credits
EgiX
References
raw.githubusercontent.com/...s/linux/http/webid_converter.rb
www.exploit-db.com/exploits/17487
www.exploit-db.com/exploits/18934
web.archive.org/...bidsupport.com/forums/showthread.php?3892
sourceforge.net/projects/simpleauction/
www.vulncheck.com/advisories/webid-remote-php-code-injection