An issue in onethink v.1.1 allows a remote attacker to execute arbitrary code via a crafted script to the AddonsController.class.php component.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/liu21st/onethink/issues/40 | third party advisory issue tracking exploit |
https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58 | third party advisory exploit |