Описание
Fat-Free Framework arbitrary code execution
In Fat-Free Framework 3.7.1, attackers can achieve arbitrary code execution if developers choose to pass user controlled input (e.g., $_REQUEST, $_GET, or $_POST) to the framework's Clear method.
Пакеты
Наименование
bcosca/fatfree
composer
Затронутые версииВерсия исправления
< 3.7.2
3.7.2
Связанные уязвимости
CVSS3: 9.8
nvd
почти 6 лет назад
In Fat-Free Framework 3.7.1, attackers can achieve arbitrary code execution if developers choose to pass user controlled input (e.g., $_REQUEST, $_GET, or $_POST) to the framework's Clear method.