Zero-day Vulnerability Database

Change view:

Zero-day vulnerabilities discovered: 1

Remote command execution in eWire PHP component
CVE-2007-4925

OS command injection

The vulnerability allows a remote attacker to execute arbitrary commands on vulnerable system.

The vulnerability exists due to insufficient sanitization of user-supplied input passed via "paymentinfo" HTTP GET parameter to "simplePHPLinux/3payment_receive.php" script. A remote attacker can send a specially crafted HTTP Get request to vulnerable script and execute arbitrary OS commands on vulnerable system with privileges of the web server.

Successful exploitation of the vulnerability allows to execute arbitrary commands and compromise vulnerable system.

Note: this vulnerability is being actively exploited.

Not patched
i

The weakness was shared 03/15/2007. The vulnerability was originally reported as zero-day by FortConsult A/S. Security patch was never issued by the vendor.

Software: Payment Client

The weakness was shared 03/15/2007. The vulnerability was originally reported as zero-day by FortConsult A/S. Security patch was never issued by the vendor.

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.