Zero-day vulnerabilities discovered: 1
OS command injection
The vulnerability allows a remote attacker to execute arbitrary commands on vulnerable system.
The vulnerability exists due to insufficient sanitization of user-supplied input passed via "paymentinfo" HTTP GET parameter to "simplePHPLinux/3payment_receive.php" script. A remote attacker can send a specially crafted HTTP Get request to vulnerable script and execute arbitrary OS commands on vulnerable system with privileges of the web server.
Successful exploitation of the vulnerability allows to execute arbitrary commands and compromise vulnerable system.
Note: this vulnerability is being actively exploited.
The weakness was shared 03/15/2007. The vulnerability was originally reported as zero-day by FortConsult A/S. Security patch was never issued by the vendor.
Software: Payment Client