Description
Tea LaTex 1.0 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary shell commands through the /api.php endpoint. Attackers can craft a malicious LaTeX payload with shell commands that are executed when processed by the application's tex2png API action.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Credits
nepska
References
www.exploit-db.com/exploits/48805
www.exploit-db.com/exploits/48805 (ExploitDB-48805)
github.com/ammarfaizi2/latex.teainside.org (Vendor Homepage)
www.vulncheck.com/advisories/tea-latex-remote-code-execution (VulnCheck Advisory: Tea LaTex 1.0 - Remote Code Execution)