Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hfpp-6hrw-77h9

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter jaction when interacting with the page mailqueue.php could lead to PHP code evaluation server-side, because the user-provided input is passed directly to the php eval() function. The user has to be authenticated on the web platform before interacting with the page.

An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter jaction when interacting with the page mailqueue.php could lead to PHP code evaluation server-side, because the user-provided input is passed directly to the php eval() function. The user has to be authenticated on the web platform before interacting with the page.

EPSS

Процентиль: 89%
0.05012
Низкий

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 8.8
nvd
больше 5 лет назад

An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter jaction when interacting with the page mailqueue.php could lead to PHP code evaluation server-side, because the user-provided input is passed directly to the php eval() function. The user has to be authenticated on the web platform before interacting with the page.

EPSS

Процентиль: 89%
0.05012
Низкий

Дефекты

CWE-20