Static code injection vulnerability in post.php in Simple PHP News 1.0 final allows remote attackers to inject arbitrary PHP code into news.txt via the post parameter, and then execute the code via a direct request to display.php. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 01:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/51816 - | |
References | () http://secunia.com/advisories/33814 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/0357 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/48829 - | |
References | () https://www.exploit-db.com/exploits/7999 - |
Information
Published : 2009-02-20 06:47
Updated : 2024-11-21 01:00
NVD link : CVE-2009-0643
Mitre link : CVE-2009-0643
CVE.ORG link : CVE-2009-0643
JSON object : View
Products Affected
dminnich
- simple_php_news
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')