vendor:
Open-Letters
by:
TUNISIAN CYBER
9.3
CVSS
HIGH
Remote Code Injection
94
CWE
Product Name: Open-Letters
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: KaliLinux (Debian)
2015
Open-Letters Remote PHP Code Injection Vulnerability
Open-Letters is vulnerable to a remote code injection vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request to the vulnerable server. This can allow an attacker to execute arbitrary code on the vulnerable server.
Mitigation:
Input validation should be used to prevent code injection attacks. All input data should be validated and filtered before being passed to the interpreter. Input validation should be applied on both syntactical and semantic level.