The get_file_type function in lib/file_content.php in DFLabs PTK 0.1, 0.2, and 1.0 allows remote malicious users to execute arbitrary commands via shell metacharacters after an arg1= sequence in a filename within a forensic image.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dflabs ptk 0.2 |
||
dflabs ptk 1.0 |
||
dflabs ptk 0.1 |