Zero-day vulnerability in Payment Client

OS command injection

Not patched

The weakness was shared 03/15/2007. The vulnerability was originally reported as zero-day by FortConsult A/S. Security patch was never issued by the vendor.

Vulnerability details

Advisory: SB2007091702 - Remote command execution in eWire PHP component

Vulnerable component: Payment Client

CVE-ID: CVE-2007-4925

CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')


The vulnerability allows a remote attacker to execute arbitrary commands on vulnerable system.

The vulnerability exists due to insufficient sanitization of user-supplied input passed via "paymentinfo" HTTP GET parameter to "simplePHPLinux/3payment_receive.php" script. A remote attacker can send a specially crafted HTTP Get request to vulnerable script and execute arbitrary OS commands on vulnerable system with privileges of the web server.

Successful exploitation of the vulnerability allows to execute arbitrary commands and compromise vulnerable system.

Note: this vulnerability is being actively exploited.

Public Exploits: