klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. This attack appear to be exploitable via Send POST request using search form. This vulnerability appears to have been fixed in 0.7 after commit 87b8c26b023c3fc37f0796b14bb13710f397b322.
References
Link | Resource |
---|---|
https://security.szurek.pl/exploit-bypass-php-escapeshellarg-escapeshellcmd.html | Exploit Third Party Advisory |
https://github.com/klaussilveira/gitlist/commit/87b8c26b023c3fc37f0796b14bb13710f397b322 | Patch Third Party Advisory |
Configurations
Information
Published : 2018-06-26 09:29
Updated : 2021-09-09 10:36
NVD link : CVE-2018-1000533
Mitre link : CVE-2018-1000533
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
gitlist
- gitlist