PHP remote file inclusion vulnerability in front/popup.php in GLPI 0.78 through 0.80.61 allows remote authenticated users to execute arbitrary PHP code via a URL in the sub_type parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2012/Feb/157 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:016 - | |
References | () https://forge.indepnet.net/issues/3338 - | |
References | () https://forge.indepnet.net/projects/glpi/repository/revisions/17457/diff/branches/0.80-bugfixes/front/popup.php - | |
References | () https://forge.indepnet.net/projects/glpi/versions/685 - |
Information
Published : 2012-07-12 20:55
Updated : 2024-11-21 01:36
NVD link : CVE-2012-1037
Mitre link : CVE-2012-1037
CVE.ORG link : CVE-2012-1037
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')