Description
Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code.
Problem types
CWE-94 Improper Control of Generation of Code ('Code Injection')
CWE-306 Missing Authentication for Critical Function
Product status
2.0 before 2.3
Credits
Egidio Romano aka EgiX
References
raw.githubusercontent.com/.../multi/http/traq_plugin_exec.rb
www.exploit-db.com/exploits/18213
www.exploit-db.com/exploits/18239
web.archive.org/web/20110729003039/https://traqproject.org/
github.com/nirix/traq/releases/tag/v2.3.1
www.vulncheck.com/advisories/traq-issue-tracking-system-rce