The weakness was shared 03/15/2007. The vulnerability was originally reported as zero-day by FortConsult A/S. Security patch was never issued by the vendor.
Vulnerable component: Payment Client
CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The vulnerability allows a remote attacker to execute arbitrary commands on vulnerable system.
The vulnerability exists due to insufficient sanitization of user-supplied input passed via "paymentinfo" HTTP GET parameter to "simplePHPLinux/3payment_receive.php" script. A remote attacker can send a specially crafted HTTP Get request to vulnerable script and execute arbitrary OS commands on vulnerable system with privileges of the web server.
Successful exploitation of the vulnerability allows to execute arbitrary commands and compromise vulnerable system.
Note: this vulnerability is being actively exploited.
- ewire Payment Client 1.60/1.70 - Command Execution [Exploit-DB]
Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.