Description
PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required.
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
0.8
Credits
Jean Pascal Pereira
References
raw.githubusercontent.com/...loits/multi/http/phptax_exec.rb
www.exploit-db.com/exploits/21665
www.exploit-db.com/exploits/21833
sourceforge.net/projects/phptax/