CVE-2014-1683

The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:skybluecanvas:skybluecanvas:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/124948/SkyBlueCanvas-CMS-1.1-r248-03-Command-Injection.html - () http://packetstormsecurity.com/files/124948/SkyBlueCanvas-CMS-1.1-r248-03-Command-Injection.html -
References () http://seclists.org/fulldisclosure/2014/Jan/159 - () http://seclists.org/fulldisclosure/2014/Jan/159 -
References () http://secunia.com/advisories/56646 - () http://secunia.com/advisories/56646 -
References () http://www.exploit-db.com/exploits/31183 - () http://www.exploit-db.com/exploits/31183 -
References () http://www.exploit-db.com/exploits/31432 - () http://www.exploit-db.com/exploits/31432 -
References () http://www.securityfocus.com/bid/65129 - () http://www.securityfocus.com/bid/65129 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/90670 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/90670 -

Information

Published : 2014-01-29 18:55

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1683

Mitre link : CVE-2014-1683

CVE.ORG link : CVE-2014-1683


JSON object : View

Products Affected

skybluecanvas

  • skybluecanvas
CWE
CWE-134

Use of Externally-Controlled Format String