form.php in PMOS Help Desk 2.4 and earlier sends a redirect to the web browser but does not exit, which allows remote attackers to conduct eval injection attacks and execute arbitrary PHP code via the options array parameter.
References
Configurations
History
21 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/42662 - | |
References | () http://secunia.com/advisories/28201 - | |
References | () http://www.securityfocus.com/bid/27032 - | |
References | () http://www.vupen.com/english/advisories/2007/4321 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/39274 - | |
References | () https://www.exploit-db.com/exploits/4789 - |
Information
Published : 2007-12-28 00:46
Updated : 2024-11-21 00:40
NVD link : CVE-2007-6550
Mitre link : CVE-2007-6550
CVE.ORG link : CVE-2007-6550
JSON object : View
Products Affected
pmos_helpdesk
- pmos_helpdesk
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')