Skip to content

Disable unsafe system() execution in asdas3d.php to prevent RCE#291

Open
zeropath-ai-staging[bot] wants to merge 1 commit intor0path-patch-20-testfrom
zvuln_fix_52297f1d
Open

Disable unsafe system() execution in asdas3d.php to prevent RCE#291
zeropath-ai-staging[bot] wants to merge 1 commit intor0path-patch-20-testfrom
zvuln_fix_52297f1d

Conversation

@zeropath-ai-staging
Copy link

This vulnerability allows attackers to execute arbitrary commands on the server, potentially leading to complete system compromise. The system() call in asdas3d.php (lines 8-8) directly uses the value of the cmd GET parameter without any sanitization. This allows an attacker to inject malicious commands into the system, resulting in unauthorized access and control.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants