Eval injection vulnerability in globalsoff.php in Turnkey PHP Live Helper 2.0.1 and earlier allows remote attackers to execute arbitrary PHP code via the test parameter, and probably arbitrary parameters, to chat.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://demos.turnkeywebtools.com/phplivehelper/docs/change_log.txt - | |
References | () http://secunia.com/advisories/31521 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/4178 - | |
References | () http://www.gulftech.org/?node=research&article_id=00124-08162008 - | |
References | () http://www.securityfocus.com/archive/1/495542/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/30729 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44571 - | |
References | () https://www.exploit-db.com/exploits/6261 - |
Information
Published : 2008-08-21 17:41
Updated : 2024-11-21 00:50
NVD link : CVE-2008-3764
Mitre link : CVE-2008-3764
CVE.ORG link : CVE-2008-3764
JSON object : View
Products Affected
turnkeywebtools
- php_live_helper
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')