Description
plugins/useradmin/fingeruser.php in XRMS CRM, possibly 1.99.2, allows remote authenticated users to execute arbitrary code via shell metacharacters in the username parameter.
Exploits (1)
exploitdb
WORKING POC
by Benjamin Harris · pythonwebappsphp
https://www.exploit-db.com/exploits/34452
References (5)
Core 5
Core References
Exploit x_refsource_misc
http://packetstormsecurity.com/files/128030/XRMS-Blind-SQL-Injection-Command-Execution.html
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2014/Aug/78
Exploit mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2014/08/27/4
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2014/08/29/1
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/34452
Scores
EPSS
0.0852
EPSS Percentile
92.4%
Details
CWE
CWE-89
Status
published
Products (1)
xrms_crm_project/xrms_crm
1.99.2
Published
Sep 02, 2014
Tracked Since
Feb 18, 2026