execInBackground.php in J-OWAMP Web Interface 2.1b and previous versions allows remote malicious users to execute arbitrary commands via shell metacharacters to the (1) exe and (2) args parameters, which are used in an exec function call. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
j-owamp web interface |