components/filemanager/class.filemanager.php in Codiad before 2.8.4 is vulnerable to remote command execution because shell commands can be embedded in parameter values, as demonstrated by search_file_type.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/Codiad/Codiad/pull/1013/commits/b3645b4c6718cef6de7003f41aafe7bfcc0395d1 | third party advisory patch |
http://www.jianshu.com/p/41ac7ac2a7af | third party advisory exploit |
https://github.com/Codiad/Codiad/issues/1011 | third party advisory |
https://github.com/Codiad/Codiad/pull/1013 | third party advisory |