CVE-2011-10011
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-13

Last updated on: 2025-08-14

Assigner: VulnCheck

Description
WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-13
Last Modified
2025-08-14
Generated
2026-05-06
AI Q&A
2025-08-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
webid webid 1.0.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2011-10011 is a critical remote PHP code injection vulnerability in WeBid version 1.0.2. It occurs in the converter.php script where unsanitized input from the 'to' parameter of a POST request is directly written into the includes/currencies.php file. This allows an unauthenticated attacker to inject arbitrary PHP code, which results in persistent remote code execution when the modified script is accessed or included by the application. The vulnerability requires no authentication, user interaction, or privileges, making it highly exploitable. The injection is done by sending a specially crafted POST request that closes existing PHP code and appends malicious PHP code, enabling the attacker to execute arbitrary commands on the server. [1, 2, 3, 5]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including complete compromise of the affected server. An attacker can execute arbitrary PHP code remotely without any authentication, leading to full remote code execution. This can allow attackers to run malicious commands, install backdoors, manipulate or steal data, disrupt service availability, and potentially gain control over the hosting environment. Since the injected code persists in the currencies.php file, the attack can maintain long-term access. Additionally, the vulnerability is part of multiple critical security flaws in WeBid 1.0.2, including SQL injection, local file inclusion, and information disclosure, which collectively increase the risk of system compromise. [1, 2, 3, 5, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can be performed by checking if the target system is running WeBid version 1.0.2, which is vulnerable. This can be done by requesting the file "docs/changes.txt" and looking for the version string "1.0.2 - 17/01/11". Additionally, checking for the presence and content of "converter.php" can help confirm the vulnerable installation. To detect exploitation attempts, monitor for POST requests to "converter.php" with parameters such as "action=convert", "from=USD", and suspicious or malicious payloads in the "to" parameter. A sample command using curl to check the version file is: `curl -s http://target/docs/changes.txt | grep '1.0.2 - 17/01/11'`. To check for the vulnerable script: `curl -s http://target/converter.php` and inspect the response or presence of the file. Network IDS/IPS rules can be created to alert on POST requests to "converter.php" containing suspicious PHP code in the "to" parameter. Also, inspecting the "includes/currencies.php" file for unexpected modifications or injected PHP code can indicate compromise. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) If possible, upgrade or patch WeBid to a version that fixes the vulnerability; however, the product is no longer supported, so patches may not be available. 2) Restrict access to the vulnerable "converter.php" script by applying web server access controls (e.g., IP whitelisting, authentication) or disabling the script if not needed. 3) Monitor and remove any injected malicious code from "includes/currencies.php" by restoring it to a clean state. 4) Apply input sanitization and validation on POST parameters, especially the "to" parameter in "converter.php", to prevent code injection. 5) Use web application firewalls (WAF) to block suspicious POST requests targeting "converter.php". 6) Review and apply security patches or code fixes that sanitize inputs and harden SQL queries and file inclusions as described in the patches. 7) If exploitation is suspected, perform a full security audit and consider rebuilding the affected system to ensure no persistent backdoors remain. [1, 2, 3, 6]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart