The _json_decode function in plugins/context_reaction_block.inc in the Context module 6.x-2.x before 6.x-3.2 and 7.x-3.x before 7.x-3.0 for Drupal, when using a version of PHP that does not support the json_decode function, allows remote attackers to execute arbitrary PHP code via unspecified vectors related to Ajax operations, possibly involving eval injection.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://drupalcode.org/project/context.git/commitdiff/63ef4d9 - Patch | |
References | () http://drupalcode.org/project/context.git/commitdiff/d7b4afa - Patch | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-November/121433.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-November/122298.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-November/122308.html - | |
References | () https://drupal.org/node/2112785 - Patch | |
References | () https://drupal.org/node/2112791 - Patch | |
References | () https://drupal.org/node/2113317 - Patch, Vendor Advisory |
Information
Published : 2013-12-07 20:55
Updated : 2024-11-21 01:55
NVD link : CVE-2013-4446
Mitre link : CVE-2013-4446
CVE.ORG link : CVE-2013-4446
JSON object : View
Products Affected
steven_jones
- context
drupal
- drupal
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')