The Ploticus module in PhpWiki 1.5.0 allows remote attackers to execute arbitrary code via shell metacharacters in a device option in the edit[content] parameter to index.php/HeIp. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 02:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/show/osvdb/110576 - | |
References | () http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Aug/77 - Exploit | |
References | () http://seclists.org/oss-sec/2014/q3/456 - Exploit | |
References | () http://seclists.org/oss-sec/2014/q3/465 - Exploit | |
References | () http://secunia.com/advisories/60293 - | |
References | () http://www.exploit-db.com/exploits/34451 - Exploit |
Information
Published : 2014-09-11 14:16
Updated : 2024-11-21 02:12
NVD link : CVE-2014-5519
Mitre link : CVE-2014-5519
CVE.ORG link : CVE-2014-5519
JSON object : View
Products Affected
phpwiki_project
- phpwiki
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')