The writeLog function in fn_common.php in gps-server.net GPS Tracking Software (self hosted) through 3.0 allows remote attackers to inject arbitrary PHP code via a crafted request that is mishandled during admin log viewing, as demonstrated by <?php system($_GET[cmd]); ?> in a login request.
References
Link | Resource |
---|---|
https://s1.gps-server.net/changelog.txt | Vendor Advisory Release Notes |
https://gist.github.com/pak0s/ea7a80c2614d9cd43cfb8230c65c9fec | Patch Third Party Advisory |
https://www.exploit-db.com/exploits/43431/ | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-01-02 07:29
Updated : 2018-01-18 07:58
NVD link : CVE-2017-17098
Mitre link : CVE-2017-17098
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
gps-server
- gps_tracking_software