phpMyBackupPro 2.5 and earlier does not properly escape the "." character in request parameters, which allows remote authenticated users with knowledge of a web-accessible and web-writeable directory on the target system to inject and execute arbitrary PHP scripts by injecting scripts via the path, filename, and dirs parameters to scheduled.php, and making requests to injected scripts.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2015/05/04/4 | Mailing List Third Party Advisory |
http://www.securitytracker.com/id/1032250 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/05/04/4 | Mailing List Third Party Advisory |
http://www.securitytracker.com/id/1032250 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2015/05/04/4 - Mailing List, Third Party Advisory | |
References | () http://www.securitytracker.com/id/1032250 - Third Party Advisory, VDB Entry |
Information
Published : 2017-07-21 14:29
Updated : 2024-11-21 02:29
NVD link : CVE-2015-3640
Mitre link : CVE-2015-3640
CVE.ORG link : CVE-2015-3640
JSON object : View
Products Affected
phpmybackuppro
- phpmybackuppro
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')