Nov. 16, 2022, 4:13 p.m. |

Packet Storm packetstormsecurity.com

Revenue Collection System version 1.0 suffers from an unauthenticated SQL injection vulnerability in step1.php that allows remote attackers to write a malicious PHP file to disk. The resulting file can then be accessed within the /rates/admin/DBbackup directory. This script will write the malicious PHP file to disk, issue a user-defined command, then retrieve the result of that command.

code code execution collection injection remote code execution revenue sql sql injection system

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Specialist

@ Lely | Maassluis, Netherlands

IT Security Manager (Corporate Security) (REF822R)

@ Deutsche Telekom IT Solutions | Budapest, Hungary

Senior Security Architect

@ Cassa Centrale Banca - Credito Cooperativo Italiano | Trento, IT, 38122

Senior DevSecOps Engineer

@ Raft | Las Vegas, NV (Remote)

Product Manager - Compliance

@ Arctic Wolf | Remote - Colorado