The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.
References
Configurations
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/124948/SkyBlueCanvas-CMS-1.1-r248-03-Command-Injection.html - | |
References | () http://seclists.org/fulldisclosure/2014/Jan/159 - | |
References | () http://secunia.com/advisories/56646 - | |
References | () http://www.exploit-db.com/exploits/31183 - | |
References | () http://www.exploit-db.com/exploits/31432 - | |
References | () http://www.securityfocus.com/bid/65129 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90670 - |
Information
Published : 2014-01-29 18:55
Updated : 2024-11-21 02:04
NVD link : CVE-2014-1683
Mitre link : CVE-2014-1683
CVE.ORG link : CVE-2014-1683
JSON object : View
Products Affected
skybluecanvas
- skybluecanvas
CWE
CWE-134
Use of Externally-Controlled Format String