action_public/search.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote attackers to execute arbitrary PHP code via a search with a crafted value of the lastdate parameter, which alters the behavior of a regular expression to add a "#e" (execute) modifier.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://forums.invisionpower.com/index.php?showtopic=213374 - Patch | |
References | () http://secunia.com/advisories/19830 - | |
References | () http://securityreason.com/securityalert/796 - | |
References | () http://www.osvdb.org/25005 - | |
References | () http://www.securityfocus.com/archive/1/431990/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/432226/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/432451/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/439607/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17695 - | |
References | () http://www.vupen.com/english/advisories/2006/1534 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26070 - |
Information
Published : 2006-04-26 20:06
Updated : 2024-11-21 00:10
NVD link : CVE-2006-2059
Mitre link : CVE-2006-2059
CVE.ORG link : CVE-2006-2059
JSON object : View
Products Affected
invision_power_services
- invision_power_board
CWE