Vulnerability Description
An OS command injection vulnerability exists in WebTester version 5.x via the install2.php installation script. The parameters cpusername, cppassword, and cpdomain are passed directly to shell commands without sanitization. A remote unauthenticated attacker can exploit this flaw by sending a crafted HTTP POST request, resulting in arbitrary command execution on the underlying system with web server privileges.
Related Weaknesses (CWE)
References
- https://advisories.checkpoint.com/defense/advisories/public/2014/cpai-2014-1620.
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://sourceforge.net/p/webtesteronline/bugs/3/
- https://www.exploit-db.com/exploits/29132
- https://www.vulncheck.com/advisories/webtester-unauth-command-execution
FAQ
What is CVE-2013-10037?
CVE-2013-10037 is a documented vulnerability. An OS command injection vulnerability exists in WebTester version 5.x via the install2.php installation script. The parameters cpusername, cppassword, and cpdomain are passed directly to shell command...
How severe is CVE-2013-10037?
CVSS scoring is not yet available for CVE-2013-10037. Check NVD for updates.
Is there a patch for CVE-2013-10037?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.