An OS command injection vulnerability exists in sar2html version 3.2.2 and prior via the plot parameter in index.php. The application fails to sanitize user-supplied input before using it in a system-level context. Remote, unauthenticated attackers can inject shell commands by appending them to the plot parameter (e.g., ?plot=;id) in a crafted GET request. The output of the command is displayed in the application's interface after interacting with the host selection UI. Successful exploitation leads to arbitrary command execution on the underlying system.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Jun 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An OS command injection vulnerability exists in sar2html version 3.2.2 and prior via the plot parameter in index.php. The application fails to sanitize user-supplied input before using it in a system-level context. Remote, unauthenticated attackers can inject shell commands by appending them to the plot parameter (e.g., ?plot=;id) in a crafted GET request. The output of the command is displayed in the application's interface after interacting with the host selection UI. Successful exploitation leads to arbitrary command execution on the underlying system. | |
Title | sar2html OS Command Injection | |
Weaknesses | CWE-20 CWE-78 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-06-20T18:40:04.545Z
Updated: 2025-06-20T18:40:04.545Z
Reserved: 2025-04-15T19:15:22.546Z
Link: CVE-2025-34030

No data.

Status : Received
Published: 2025-06-20T19:15:37.343
Modified: 2025-06-20T19:15:37.343
Link: CVE-2025-34030

No data.