An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter jaction when interacting with the page mailqueue.php could lead to PHP code evaluation server-side, because the user-provided input is passed directly to the php eval() function. The user has to be authenticated on the web platform before interacting with the page.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://www.spamtitan.com/ | vendor advisory |
https://github.com/felmoltor | third party advisory |
https://twitter.com/felmoltor | third party advisory |
https://sensepost.com/blog/2020/clash-of-the-spamtitan/ | third party advisory exploit |
http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html | third party advisory exploit |