In the EyesOfNetwork web interface (aka eonweb) 5.1-0, module\tool_all\tools\interface.php does not properly restrict exec calls, which allows remote malicious users to execute arbitrary commands via shell metacharacters in the host_list parameter to module/tool_all/select_tool.php.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
eyesofnetwork eyesofnetwork 5.1-0 |