Potential remote code execution vulnerability fix.

Can be exploitable, when we have X-Forwarded-For->X-Real-IP
transformation.
This commit is contained in:
INVENT 2015-01-19 15:51:46 +03:00
commit 512283e528

View file

@ -14,7 +14,8 @@ if (isset($_POST['user']) || isset($_POST['hash'])) {
$v_user = escapeshellarg($_POST['user']);
$v_password = escapeshellarg($_POST['password']);
exec(VESTA_CMD ."v-check-user-password ".$v_user." ".$v_password." '".$_SERVER["REMOTE_ADDR"]."'", $output, $auth_code);
$v_ip_addr = escapeshellarg($_SERVER["REMOTE_ADDR"]);
exec(VESTA_CMD ."v-check-user-password ".$v_user." ".$v_password." '".$v_ip_addr."'", $output, $auth_code);
} else {
$key = '/usr/local/vesta/data/keys/' . basename($_POST['hash']);
if (file_exists($key) && is_file($key)) {