vendor:
Asteridex
by:
Carl Livitt / Hoku Security
7.5
CVSS
HIGH
Remote Code Execution
Unknown
CWE
Product Name: Asteridex
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: No
Related CWE: Unknown
CPE: Unknown
Platforms Tested:
2007
Asteridex PoC Exploit (callboth.php vulnerability)
This exploit targets the callboth.php file in the Asteridex web application. It allows an attacker to execute arbitrary shell commands on the target server by manipulating the SEQ and IN parameters in the URL. The exploit uses the curl command to send HTTP requests to the target server and execute the commands.
Mitigation:
The vulnerability can be mitigated by updating the Asteridex web application to a patched version that fixes the callboth.php vulnerability. It is also recommended to implement strong access controls and input validation to prevent unauthorized access and manipulation of the SEQ and IN parameters.