Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p36v-wg2q-q2q7

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple eval injection vulnerabilities in Php-Stats 0.1.9.2 allow remote authenticated administrators to execute arbitrary code by writing PHP sequences to the php-stats-options record in the _options table, which is used in an eval function call by (1) admin.php, (2) click.php, (3) download.php, and unspecified other files, as demonstrated by modifying _options through a backup restore action in admin.php.

Multiple eval injection vulnerabilities in Php-Stats 0.1.9.2 allow remote authenticated administrators to execute arbitrary code by writing PHP sequences to the php-stats-options record in the _options table, which is used in an eval function call by (1) admin.php, (2) click.php, (3) download.php, and unspecified other files, as demonstrated by modifying _options through a backup restore action in admin.php.

EPSS

Процентиль: 93%
0.10705
Средний

Дефекты

CWE-94

Связанные уязвимости

nvd
больше 18 лет назад

Multiple eval injection vulnerabilities in Php-Stats 0.1.9.2 allow remote authenticated administrators to execute arbitrary code by writing PHP sequences to the php-stats-options record in the _options table, which is used in an eval function call by (1) admin.php, (2) click.php, (3) download.php, and unspecified other files, as demonstrated by modifying _options through a backup restore action in admin.php.

EPSS

Процентиль: 93%
0.10705
Средний

Дефекты

CWE-94