Potential code injection in fun delete_directory
Medium
E
ExpressionEngine
Submitted None
Actions:
Reported by
freetom
Vulnerability Details
Technical details and impact analysis
Under /system/ee/legacy/libraries/Functions.php, function delete_directory contains calls to `exec` 3 times using different, potentially "unsanitized" paramateres. As the PHP manual suggest, `escapeshellarg` should be used to sanitize individual arguments [1].
On an implementation in which the attacker controls the file name, arbitrary code execution is achieved. Better to fix it.
[1] http://php.net/manual/en/function.escapeshellarg.php
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Code Injection