header-logo
Suggest Exploit
vendor:
e107
by:
Unknown
7.5
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: e107
Affected Version From: 2000.7.24
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:e107:e107:0.7.24
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Remote Command Execution in e107

e107 is prone to a remote command-execution vulnerability because it fails to properly validate user-supplied input. An attacker can exploit this issue to execute arbitrary commands within the context of the vulnerable application.

Mitigation:

The vendor should release a patch to properly validate user-supplied input and prevent command execution. In the meantime, users can mitigate the risk by implementing input validation and sanitization mechanisms in their e107 installations.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/50339/info

e107 is prone to a remote command-execution vulnerability because it fails to properly validate user-supplied input.

An attacker can exploit this issue to execute arbitrary commands within the context of the vulnerable application.

e107 0.7.24 is vulnerable; other versions may also be affected. 

http://www.example.com/e107_config.php?cmd=id 
cqrsecured