awstatstotals.php in AWStats Totals 1.0 through 1.14 allows remote attackers to execute arbitrary code via PHP sequences in the sort parameter, which is used by the multisort function when dynamically creating an anonymous PHP function.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31630 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/4218 - | |
References | () http://securityreason.com/securityalert/8259 - | |
References | () http://userwww.service.emory.edu/~ekenda2/EMORY-2008-01.txt - | |
References | () http://www.exploit-db.com/exploits/17324 - | |
References | () http://www.securityfocus.com/archive/1/495770/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/30856 - | |
References | () http://www.telartis.nl/xcms/awstats/ - Patch | |
References | () http://www.vupen.com/english/advisories/2008/2442 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44712 - | |
References | () https://www.exploit-db.com/exploits/6368 - |
Information
Published : 2008-09-04 18:41
Updated : 2024-11-21 00:50
NVD link : CVE-2008-3922
Mitre link : CVE-2008-3922
CVE.ORG link : CVE-2008-3922
JSON object : View
Products Affected
telartis_bv
- awstats_totals
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')