Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gpqh-rc5f-935m

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.

avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.

EPSS

Процентиль: 94%
0.14625
Средний

Дефекты

CWE-94

Связанные уязвимости

nvd
почти 17 лет назад

avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.

EPSS

Процентиль: 94%
0.14625
Средний

Дефекты

CWE-94