You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
MacWarrior
published
GHSA-3x4g-x3gv-rjmqOct 20, 2025
Package
No package listed
Affected versions
<= 5.5.2 - #146
Patched versions
>= 5.5.2 - #147
Description
Summary
In /upload/admin_area/actions/update_launch.php, the "type" parameter from a POST request is embedded into PHP tags and executed. Proper sanitization is not performed, and by injecting malicious code an attacker can execute arbitrary PHP code. This allows an attacker to achieve RCE.
Details
The attacker requires administrator privileges.
The attacker uses the administrator's PHPSESSID and runs a curl command like the following.
As a result, a shell command is executed on PHP, and /tmp/malicious.txt is created on the web server.
This occurs because the application constructs a string containing a PHP tag in the variable $data by inserting $_POST['type'] without sanitization, and that string is ultimately executed via shell_exec($cmd).
Because type can be freely set by the client, the server must properly sanitize it.
PoC
PoC_RCE.mp4
Impact
An attacker can insert arbitrary PHP code, which enables RCE.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Learn more on MITRE.
Summary
In /upload/admin_area/actions/update_launch.php, the "type" parameter from a POST request is embedded into PHP tags and executed. Proper sanitization is not performed, and by injecting malicious code an attacker can execute arbitrary PHP code. This allows an attacker to achieve RCE.
Details
The attacker requires administrator privileges.
The attacker uses the administrator's PHPSESSID and runs a curl command like the following.
As a result, a shell command is executed on PHP, and /tmp/malicious.txt is created on the web server.
This occurs because the application constructs a string containing a PHP tag in the variable $data by inserting $_POST['type'] without sanitization, and that string is ultimately executed via shell_exec($cmd).
Because type can be freely set by the client, the server must properly sanitize it.
PoC
PoC_RCE.mp4
Impact
An attacker can insert arbitrary PHP code, which enables RCE.