Eval injection vulnerability in zp-core/zp-extensions/viewer_size_image.php in ZENphoto 1.4.2, when the viewer_size_image plugin is enabled, allows remote attackers to execute arbitrary PHP code via the viewer_size_image_saved cookie.
References
Configurations
History
21 Nov 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-02/0037.html - Exploit | |
References | () http://secunia.com/advisories/47875 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/51916 - Exploit | |
References | () http://www.zenphoto.org/news/zenphoto-1.4.2.1 - | |
References | () http://www.zenphoto.org/trac/changeset/8994 - Exploit, Patch | |
References | () http://www.zenphoto.org/trac/changeset/8995 - Exploit, Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/73081 - | |
References | () https://www.htbridge.ch/advisory/HTB23070 - Exploit |
Information
Published : 2012-02-21 13:31
Updated : 2024-11-21 01:36
NVD link : CVE-2012-0993
Mitre link : CVE-2012-0993
CVE.ORG link : CVE-2012-0993
JSON object : View
Products Affected
zenphoto
- zenphoto
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')