The writeLog function in fn_common.php in gps-server.net GPS Tracking Software (self hosted) through 3.0 allows remote attackers to inject arbitrary PHP code via a crafted request that is mishandled during admin log viewing, as demonstrated by <?php system($_GET[cmd]); ?> in a login request.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://gist.github.com/pak0s/ea7a80c2614d9cd43cfb8230c65c9fec | third party advisory patch |
https://www.exploit-db.com/exploits/43431/ | exploit vdb entry third party advisory |
https://s1.gps-server.net/changelog.txt | release notes vendor advisory |