Description
PhotoShow 3.0 contains a remote code execution vulnerability that allows authenticated administrators to inject malicious commands through the exiftran path configuration. Attackers can exploit the ffmpeg configuration settings by base64 encoding a reverse shell command and executing it through a crafted video upload process.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Credits
LSCP Responsible Disclosure Lab
References
lscp.llc/...-code-execution-and-stored-xss-in-photoshow-3-0/
www.exploit-db.com/exploits/51236 (ExploitDB-51236)
lscp.llc/...-code-execution-and-stored-xss-in-photoshow-3-0/ (Researcher Disclosure)
github.com/thibaud-rohmer/PhotoShow (Software Repository)
www.vulncheck.com/...e-execution-via-exiftran-path-injection (VulnCheck Advisory: PhotoShow 3.0 Remote Code Execution via Exiftran Path Injection)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.