cve/2021/CVE-2021-36800.md

18 lines
937 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-36800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36800)
![](https://img.shields.io/static/v1?label=Product&message=Akaunting&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.1.12%3C%3D%202.1.12%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen)
### Description
Akaunting version 2.1.12 and earlier suffers from a code injection issue in the Money.php component of the application. A POST sent to /{company_id}/sales/invoices/{invoice_id} with an items[0][price] that includes a PHP callable function is executed directly. This issue was fixed in version 2.1.13 of the product.
### POC
#### Reference
- https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/
#### Github
No PoCs found on GitHub currently.