An issue in Weaver E-cology v. attackers construct special requests to insert remote malicious code and to trigger malicious code execution, and control server privileges
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/stuven1989/TemporaryGuild/blob/main/files/exp2-eng.pdf | broken link |
https://gist.github.com/CoinIsMoney/ec863c35dfd05c7deea2afea11bf2446 | third party advisory |