Skip to content

Possible Remote Code Execution Vulnerability in gridx php file. #2

@MayViolin

Description

@MayViolin

Hi,

We found a remote code execution vulnerability in gridx that could allow an attacker to remotely execute arbitrary code to attack an attack server.

https://tapallinone:9443/ApplicationServer/libs/dojo_1.10/gridx/tests/support/stores/test_grid_filter.php?query=XXX();

Although I can not get a feedback by adding the query parameter, but I am wondering if it will actually execute the query on server side or not? If the query will be executed, it would be a vulnerability for our products.

Please confirm what this file is used for and can it be deployed to production environment.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions