CVE-2015-9227

PHP remote file inclusion vulnerability in the get_file function in upload/admin2/controller/report_logs.php in AlegroCart 1.2.8 allows remote administrators to execute arbitrary PHP code via a URL in the file_path parameter to upload/admin2.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:alegrocart:alegrocart:1.2.8:*:*:*:*:*:*:*

History

21 Nov 2024, 02:40

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/134361/AlegroCart-1.2.8-Local-Remote-File-Inclusion.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/134361/AlegroCart-1.2.8-Local-Remote-File-Inclusion.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2015/Nov/67 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2015/Nov/67 - Exploit, Mailing List, Third Party Advisory
References () https://blog.curesec.com/article/blog/AlegroCart-128-LFIRFI-102.html - Exploit, Third Party Advisory () https://blog.curesec.com/article/blog/AlegroCart-128-LFIRFI-102.html - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/38728/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/38728/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2017-09-11 20:29

Updated : 2024-11-21 02:40


NVD link : CVE-2015-9227

Mitre link : CVE-2015-9227

CVE.ORG link : CVE-2015-9227


JSON object : View

Products Affected

alegrocart

  • alegrocart
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')