J-Security Center

Title: TalkBack Security Bypass and Remote Command Execution Vulnerability

Severity: HIGH


TalkBack is a web-based application implemented in PHP.

The application is prone to these vulnerabilities:

1. A security-bypass issue occurs because the application fails to restrict access on editing comments. Specifically, the vulnerability resides in the 'comments.php' script. An attacker may exploit the issue to edit arbitrary comments.

2. A remote command-execution issue affects the 'result' parameter of the 'addons/import.php' script.

Successful exploits may allow attackers to perform unauthorized actions or execute arbitrary commands. This may aid in further attacks.

TalkBack 2.3.14 is vulnerable; other versions may also be affected.

Affected Products:

  • TalkBack TalkBack 2.3.14


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.