project/register.php in Tuleap before 7.7, when sys_create_project_in_one_step is disabled, allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via the data parameter.
References
Configurations
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://karmainsecurity.com/KIS-2014-13 - Exploit | |
References | () http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Nov/101 - Exploit | |
References | () http://www.securityfocus.com/archive/1/534105/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/71335 - |
Information
Published : 2014-12-02 01:59
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8791
Mitre link : CVE-2014-8791
CVE.ORG link : CVE-2014-8791
JSON object : View
Products Affected
enalean
- tuleap
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')