We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2013-10037

WebTester 5.x install2.php Unauthenticated Command Execution



Description

An OS command injection vulnerability exists in WebTester version 5.x via the install2.php installation script. The parameters cpusername, cppassword, and cpdomain are passed directly to shell commands without sanitization. A remote unauthenticated attacker can exploit this flaw by sending a crafted HTTP POST request, resulting in arbitrary command execution on the underlying system with web server privileges.

Reserved 2025-07-30 | Published 2025-07-31 | Updated 2025-07-31 | Assigner VulnCheck


CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unknown

5.x
affected

Credits

bcoles finder

References

raw.githubusercontent.com/...s/unix/webapp/webtester_exec.rb exploit

sourceforge.net/p/webtesteronline/bugs/3/ issue-tracking

www.exploit-db.com/exploits/29132 exploit

advisories.checkpoint.com/...public/2014/cpai-2014-1620.html third-party-advisory

www.vulncheck.com/...ries/webtester-unauth-command-execution third-party-advisory

cve.org (CVE-2013-10037)

nvd.nist.gov (CVE-2013-10037)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2013-10037

Support options

Helpdesk Chat, Email, Knowledgebase