Files
CVEs-PoC/2017/CVE-2017-7981.md
T
2025-09-29 21:09:30 +02:00

19 lines
979 B
Markdown

### [CVE-2017-7981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7981)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
Tuleap before 9.7 allows command injection via the PhpWiki 1.3.10 SyntaxHighlighter plugin. This occurs in the Project Wiki component because the proc_open PHP function is used within PhpWiki before 1.5.5 with a syntax value in its first argument, and an authenticated Tuleap user can control this value, even with shell metacharacters, as demonstrated by a '<?plugin SyntaxHighlighter syntax="c;id"' line to execute the id command.
### POC
#### Reference
- https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts
- https://www.exploit-db.com/exploits/41953/
#### Github
No PoCs found on GitHub currently.