Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6wq4-xv9r-8vq7

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

functions/html_to_text.php in the Chat module before 1.5.2 for activeCollab allows remote authenticated users to execute arbitrary PHP code via the message[message_text] parameter to chat/add_messag, which is not properly handled when executing the preg_replace function with the eval switch.

functions/html_to_text.php in the Chat module before 1.5.2 for activeCollab allows remote authenticated users to execute arbitrary PHP code via the message[message_text] parameter to chat/add_messag, which is not properly handled when executing the preg_replace function with the eval switch.

EPSS

Процентиль: 98%
0.6269
Средний

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 12 лет назад

functions/html_to_text.php in the Chat module before 1.5.2 for activeCollab allows remote authenticated users to execute arbitrary PHP code via the message[message_text] parameter to chat/add_messag, which is not properly handled when executing the preg_replace function with the eval switch.

EPSS

Процентиль: 98%
0.6269
Средний

Дефекты

CWE-20