CVE-2014-5519

The Ploticus module in PhpWiki 1.5.0 allows remote attackers to execute arbitrary code via shell metacharacters in a device option in the edit[content] parameter to index.php/HeIp. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpwiki_project:phpwiki:1.5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:12

Type Values Removed Values Added
References () http://osvdb.org/show/osvdb/110576 - () http://osvdb.org/show/osvdb/110576 -
References () http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html - Exploit () http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html - Exploit
References () http://seclists.org/fulldisclosure/2014/Aug/77 - Exploit () http://seclists.org/fulldisclosure/2014/Aug/77 - Exploit
References () http://seclists.org/oss-sec/2014/q3/456 - Exploit () http://seclists.org/oss-sec/2014/q3/456 - Exploit
References () http://seclists.org/oss-sec/2014/q3/465 - Exploit () http://seclists.org/oss-sec/2014/q3/465 - Exploit
References () http://secunia.com/advisories/60293 - () http://secunia.com/advisories/60293 -
References () http://www.exploit-db.com/exploits/34451 - Exploit () http://www.exploit-db.com/exploits/34451 - Exploit

Information

Published : 2014-09-11 14:16

Updated : 2024-11-21 02:12


NVD link : CVE-2014-5519

Mitre link : CVE-2014-5519

CVE.ORG link : CVE-2014-5519


JSON object : View

Products Affected

phpwiki_project

  • phpwiki
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')