PhotoShow 3.0 contains a remote code execution vulnerability that allows authenticated administrators to inject malicious commands through the exiftran path configuration. Attackers can exploit the ffmpeg configuration settings by base64 encoding a reverse shell command and executing it through a crafted video upload process.
References
| Link | Resource |
|---|---|
| https://github.com/thibaud-rohmer/PhotoShow | Product |
| https://lscp.llc/index.php/2021/07/19/how-white-box-hacking-works-remote-code-execution-and-stored-xss-in-photoshow-3-0/ | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/51236 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/photoshow-remote-code-execution-via-exiftran-path-injection | Exploit Third Party Advisory |
| https://lscp.llc/index.php/2021/07/19/how-white-box-hacking-works-remote-code-execution-and-stored-xss-in-photoshow-3-0/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-22 22:16
Updated : 2025-12-27 17:15
NVD link : CVE-2023-53981
Mitre link : CVE-2023-53981
CVE.ORG link : CVE-2023-53981
JSON object : View
Products Affected
thibaud-rohmer
- photoshow
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
