Summary

Acunetix 360 identified a code execution which occurs when using an unintentional expression in template engine instead of string literals.

This is a highly critical issue and should be addressed as soon as possible.

Impact

An attacker can execute arbitrary code by using wrong construction in template engine tags. The attacker may also be able to execute arbitrary system commands.

Remediation

Do not trust the data that users supply and don't add it to directly into the template. Instead, pass user controlled parameters to the template as template parameters.

Required Skills for Successful Exploitation

This vulnerability is not difficult to leverage. There are vast resources available for template engines. Successful exploitation requires knowledge of the programming language and syntax of the template engine. Minimal attack skill is enough to exploit vulnerabilities like this one.

Severity

Critical

Classification

PCI v3.2-6.5.1 CAPEC-23 CWE-94 HIPAA-164.306(a) 164.308(a) ISO27001-A.14.2.5 OWASP 2013-A1 OWASP 2017-A1 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H