Описание
Eval injection vulnerability in index.php in phpSlash 0.8.1.1 and earlier allows remote attackers to execute arbitrary PHP code via the fields parameter, which is supplied to an eval function call within the generic function in include/class/tz_env.class. NOTE: some of these details are obtained from third party information.
Ссылки
- Vendor Advisory
- Exploit
- Vendor Advisory
- Exploit
Уязвимые конфигурации
Конфигурация 1Версия до 0.8.1.1 (включая)
Одно из
cpe:2.3:a:phpslash:phpslash:*:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:*:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:0.5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:0.6:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:0.61:*:*:*:*:*:*:*
cpe:2.3:a:phpslash:phpslash:065:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.61618
Средний
10 Critical
CVSS2
Дефекты
CWE-94
Связанные уязвимости
github
почти 4 года назад
Eval injection vulnerability in index.php in phpSlash 0.8.1.1 and earlier allows remote attackers to execute arbitrary PHP code via the fields parameter, which is supplied to an eval function call within the generic function in include/class/tz_env.class. NOTE: some of these details are obtained from third party information.
EPSS
Процентиль: 98%
0.61618
Средний
10 Critical
CVSS2
Дефекты
CWE-94