CVE-2013-10037
Severity CVSS v4.0:
CRITICAL
Type:
CWE-78
OS Command Injections
Publication date:
31/07/2025
Last modified:
31/07/2025
Description
An OS command injection vulnerability exists in WebTester version 5.x via the install2.php installation script. The parameters cpusername, cppassword, and cpdomain are passed directly to shell commands without sanitization. A remote unauthenticated attacker can exploit this flaw by sending a crafted HTTP POST request, resulting in arbitrary command execution on the underlying system with web server privileges.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- https://advisories.checkpoint.com/defense/advisories/public/2014/cpai-2014-1620.html
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/webtester_exec.rb
- https://sourceforge.net/p/webtesteronline/bugs/3/
- https://www.exploit-db.com/exploits/29132
- https://www.vulncheck.com/advisories/webtester-unauth-command-execution



