WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/webid_converter.rb
- https://www.exploit-db.com/exploits/17487
- https://www.exploit-db.com/exploits/18934
- https://www.vulncheck.com/advisories/webid-remote-php-code-injection
No PoCs found on GitHub currently.