Command_Injection issue exists @ vulnerabilities/exec/source/low.php in branch master
The application's <?php method calls an OS (shell) command with shell_exec, at line 1 of vulnerabilities\exec\source\low.php, using an untrusted string with the command to execute.
This could allow an attacker to inject an arbitrary command, and enable a Command Injection attack.
The attacker may be able to inject the executed command via user input, _REQUEST, which is retrieved by the application in the <?php method, at line 1 of vulnerabilities\exec\source\low.php.
Command_Injection issue exists @ vulnerabilities/exec/source/low.php in branch master
The application's <?php method calls an OS (shell) command with shell_exec, at line 1 of vulnerabilities\exec\source\low.php, using an untrusted string with the command to execute. This could allow an attacker to inject an arbitrary command, and enable a Command Injection attack. The attacker may be able to inject the executed command via user input, _REQUEST, which is retrieved by the application in the <?php method, at line 1 of vulnerabilities\exec\source\low.php.
Severity: High
CWE:77
Vulnerability details and guidance
Internal Guidance
Checkmarx
Training Recommended Fix
Lines: 5
Code (Line #5):