CVE-2023-54339
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
Webgrind 1.1 contains a remote command execution vulnerability that allows unauthenticated attackers to inject OS commands via the dataFile parameter in index.php. Attackers can execute arbitrary system commands by manipulating the dataFile parameter, such as using payload '0%27%26calc.exe%26%27' to execute commands on the target system.
Analysis
Webgrind 1.1 has unauthenticated command injection via the dataFile parameter in index.php. The profiling tool executes OS commands directly from URL parameters. PoC available.
Technical Context
The dataFile parameter is passed to a system command without sanitization (CWE-78).
Affected Products
Webgrind 1.1
Remediation
Remove Webgrind from production servers. Use it only in local development environments.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today