ATutor 1.4.1 through 1.5.1-pl1 allows remote attackers to execute arbitrary PHP functions via a direct request to forum.inc.php with a modified addslashes parameter with either the (1) asc or (2) desc parameters set, possibly due to an eval injection vulnerability.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=113043022821049&w=2 | |
http://secunia.com/advisories/16915/ | Exploit Patch Vendor Advisory |
http://secunia.com/secunia_research/2005-55/advisory/ | Exploit Patch Vendor Advisory |
http://securityreason.com/securityalert/123 | |
http://securitytracker.com/id?1015165 | |
http://www.osvdb.org/20344 | Patch |
http://www.securityfocus.com/bid/15221 | Exploit Patch |
http://www.vupen.com/english/advisories/2005/2228 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2005-11-01T11:00:00
Updated: 2016-10-17T13:57:01
Reserved: 2005-11-01T00:00:00
Link: CVE-2005-3405
JSON object: View
NVD Information
Status : Modified
Published: 2005-11-01T12:47:00.000
Modified: 2016-10-18T03:35:18.663
Link: CVE-2005-3405
JSON object: View
Redhat Information
No data.
CWE