PHP prior to 4.3.7 on Win32 platforms does not properly filter all shell metacharacters, which allows local or remote malicious users to execute arbitrary code, overwrite files, and access internal environment variables via (1) the "%", "|", or ">" characters to the escapeshellcmd function, or (2) the "%" character to the escapeshellarg function.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
php php |