PHP code execution in PlaySMS



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-9080
CWE-ID CWE-94
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
PlaySMS
Mobile applications / Apps for mobile phones

Vendor playsms.sourceforge.net

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) PHP code injection

EUVDB-ID: #VU6700

Risk: Medium

CVSSv4.0: 8.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Green]

CVE-ID: CVE-2017-9080

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.

The weakness exists due to improper validation of user-supplied input passed via uploaded .csv file to sendfromfile.php. A remote attacker can upload a specially crafted file and execute PHP code contained in its name.

Mitigation

Install update from vendor's website.

Vulnerable software versions

PlaySMS: 1.4

CPE2.3 External links

https://touhidshaikh.com/blog/poc/playsms-v1-4-rce/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to perform certain actions on the device.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###