Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wg2x-hhw5-q4hx

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Sharetronix 3.1.1.3, 3.1.1, and earlier allows remote attackers to execute arbitrary PHP code via the (1) activities_text parameter to services/activities/set or (2) comments_text parameter to services/comments/set, which is not properly handled when executing the preg_replace function with the e modifier.

Sharetronix 3.1.1.3, 3.1.1, and earlier allows remote attackers to execute arbitrary PHP code via the (1) activities_text parameter to services/activities/set or (2) comments_text parameter to services/comments/set, which is not properly handled when executing the preg_replace function with the e modifier.

EPSS

Процентиль: 77%
0.01028
Низкий

Дефекты

CWE-94

Связанные уязвимости

nvd
больше 11 лет назад

Sharetronix 3.1.1.3, 3.1.1, and earlier allows remote attackers to execute arbitrary PHP code via the (1) activities_text parameter to services/activities/set or (2) comments_text parameter to services/comments/set, which is not properly handled when executing the preg_replace function with the e modifier.

EPSS

Процентиль: 77%
0.01028
Низкий

Дефекты

CWE-94