Loading HuntDB...

Potential code injection in fun delete_directory

Medium
E
ExpressionEngine
Submitted None
Reported by freetom

Vulnerability Details

Technical details and impact analysis

Code Injection
Under /system/ee/legacy/libraries/Functions.php, function delete_directory contains calls to `exec` 3 times using different, potentially "unsanitized" paramateres. As the PHP manual suggest, `escapeshellarg` should be used to sanitize individual arguments [1]. On an implementation in which the attacker controls the file name, arbitrary code execution is achieved. Better to fix it. [1] http://php.net/manual/en/function.escapeshellarg.php

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Code Injection