If the attacker has access to a valid Poweruser session,...
High severity
Unreviewed
Published
Dec 10, 2024
to the GitHub Advisory Database
•
Updated Dec 20, 2024
Description
Published by the National Vulnerability Database
Dec 10, 2024
Published to the GitHub Advisory Database
Dec 10, 2024
Last updated
Dec 20, 2024
If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data".
References