OS Command Injection in export.php (vulnerable function called from include/functions-article.php) in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to achieve Code Execution by saving the code to be executed as the wkhtmltopdf path via admin/save-settings.php.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://antoniocannito.it/?p=137#rce3 | third party advisory exploit |
https://antoniocannito.it/phpkb1#out-of-band-blind-authenticated-remote-code-execution-cve-2020-10390 | third party advisory exploit |