functions.php in WHMCompleteSolution (WHMCS) 4.0.x through 5.0.x allows remote attackers to trigger arbitrary code execution in the Smarty templating system by submitting a crafted ticket, related to improper handling of characters in the subject field.
References
Link | Resource |
---|---|
http://forum.whmcs.com/showthread.php?t=43462 | Patch Vendor Advisory |
http://www.webhostingtalk.com/showpost.php?p=7848685&postcount=35 | |
http://forum.whmcs.com/showthread.php?t=43462 | Patch Vendor Advisory |
http://www.webhostingtalk.com/showpost.php?p=7848685&postcount=35 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://forum.whmcs.com/showthread.php?t=43462 - Patch, Vendor Advisory | |
References | () http://www.webhostingtalk.com/showpost.php?p=7848685&postcount=35 - |
Information
Published : 2012-01-14 03:57
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5061
Mitre link : CVE-2011-5061
CVE.ORG link : CVE-2011-5061
JSON object : View
Products Affected
whmcs
- whmcompletesolution
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')