Clipperz Password Manager 'objectname' Remote Code Execution Vulnerability

Summary
This host is running Clipperz Password Manager and is prone to remote code execution vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary php code. Impact Level: Application
Solution
No solution or patch is available as of 30th January, 2015. Information regarding this issue will updated once the solution details are available. For updates refer, https://clipperz.is/
Insight
The error exists as input passed via the 'objectname' parameter is not properly sanitized upon submission to the /backend/php/src/setup/rpc.php script
Affected
Clipperz Password Manager.
Detection
Send the crafted HTTP GET request and check is it possible to execute an arbitrary php code.
References