Описание
Direct static code injection vulnerability in phpBook 1.3.2 and earlier allows remote attackers to execute arbitrary PHP code via the e-mail field (mail variable) in a new message, which is written to a PHP file.
Ссылки
- Patch
- Vendor Advisory
- PatchVendor Advisory
- Patch
- Vendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.3.2 (включая)
Одно из
cpe:2.3:a:gnu:phpbook:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:phpbook:1.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:phpbook:1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:phpbook:1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:phpbook:1.3:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.07816
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Direct static code injection vulnerability in phpBook 1.3.2 and earlier allows remote attackers to execute arbitrary PHP code via the e-mail field (mail variable) in a new message, which is written to a PHP file.
EPSS
Процентиль: 92%
0.07816
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other