Ovidentia version 8.4.3 and earlier contains a Unsanitized User Input vulnerability in utilit.php, bab_getAddonFilePathfromTg that can result in Authenticated Remote Code Execution. This attack appear to be exploitable via The attacker must have permission to upload addons.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://drive.google.com/open?id=195h-LirGiIVKxioyusw3SvmLp8BljPxe | third party advisory technical description |
https://www.ovidentia.org/modules | vendor advisory |
https://www.ovidentia.org/index.php? | vendor advisory |