The get_file_type function in lib/file_content.php in DFLabs PTK 0.1, 0.2, and 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters after an arg1= sequence in a filename within a forensic image.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2009-05-07 17:30
Updated : 2024-02-04 17:33
NVD link : CVE-2008-6793
Mitre link : CVE-2008-6793
CVE.ORG link : CVE-2008-6793
JSON object : View
Products Affected
dflabs
- ptk
CWE
CWE-20
Improper Input Validation