This advisory details a PHP code execution vulnerability in the jui_filter_rules library, where attacker-controlled input in the 'filter_value_conversion_server_side' parameter allows arbitrary PHP function execution via 'call_user_func_array'. The PoC demonstrates RCE by executing 'shell_exec' to read '/etc/passwd'.
Classification
Writeup 100%
Target:
jui_filter_rules (versions >= commit b1e795e and < 1.0.6)
No auth needed
Prerequisites:
Access to a web application using the vulnerable jui_filter_rules PHP library