CVE-2015-3640

phpMyBackupPro 2.5 and earlier does not properly escape the "." character in request parameters, which allows remote authenticated users with knowledge of a web-accessible and web-writeable directory on the target system to inject and execute arbitrary PHP scripts by injecting scripts via the path, filename, and dirs parameters to scheduled.php, and making requests to injected scripts.
References
Link Resource
http://www.openwall.com/lists/oss-security/2015/05/04/4 Mailing List Third Party Advisory
http://www.securitytracker.com/id/1032250 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2015/05/04/4 Mailing List Third Party Advisory
http://www.securitytracker.com/id/1032250 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpmybackuppro:phpmybackuppro:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:29

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2015/05/04/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/05/04/4 - Mailing List, Third Party Advisory
References () http://www.securitytracker.com/id/1032250 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1032250 - Third Party Advisory, VDB Entry

Information

Published : 2017-07-21 14:29

Updated : 2024-11-21 02:29


NVD link : CVE-2015-3640

Mitre link : CVE-2015-3640

CVE.ORG link : CVE-2015-3640


JSON object : View

Products Affected

phpmybackuppro

  • phpmybackuppro
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')