vendor:
Tea LaTex
by:
nepsk
9.8
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Tea LaTex
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: YES
Related CWE: N/A
CPE: a:ammarfaizi2:latex.teainside.org
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Kali Linux / Windows 10
2020
Tea LaTex 1.0 – Remote Code Execution (Unauthenticated)
Tea LaTex 1.0 is vulnerable to unauthenticated remote code execution. An attacker can send a malicious payload to the /api.php?action=tex2png endpoint to execute arbitrary code on the server. The payload is sent as a POST request with the content type set to text/plain and the charset set to UTF-8. The payload is then executed on the server, allowing the attacker to gain a remote shell.
Mitigation:
The vendor has released a patch to address this vulnerability. It is recommended to update to the latest version of Tea LaTex 1.0.