Eval injection vulnerability in the template engine for SysCP 1.2.10 and earlier allows remote attackers to execute arbitrary PHP code via a string containing the code within "{" and "}" (curly bracket) characters, which are processed by the PHP eval function.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=112352095923614&w=2 | |
http://www.hardened-php.net/advisory_132005.64.html | Vendor Advisory |
http://www.syscp.de/forum/viewtopic.php?t=1772 | Patch |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2005-08-16T04:00:00
Updated: 2016-10-17T13:57:01
Reserved: 2005-08-16T00:00:00
Link: CVE-2005-2568
JSON object: View
NVD Information
Status : Modified
Published: 2005-08-16T04:00:00.000
Modified: 2016-10-18T03:28:32.080
Link: CVE-2005-2568
JSON object: View
Redhat Information
No data.
CWE