Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.linkedin.com/in/xvinicius/ | permissions required |
https://www.linkedin.com/in/hairrison-wenning-4631a4124/ | not applicable |
https://www.qualitor.com.br/qualitor-8-20 | product release notes |
https://openxp.xpsec.co/blog/cve-2023-47253 | third party advisory exploit |