CVE-2018-16604

An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").
References
Link Resource
https://github.com/dignajar/nibbleblog/issues/131 Exploit Third Party Advisory
https://github.com/dignajar/nibbleblog/issues/131 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:nibbleblog:nibbleblog:4.0.5:*:*:*:*:*:*:*

History

21 Nov 2024, 03:53

Type Values Removed Values Added
References () https://github.com/dignajar/nibbleblog/issues/131 - Exploit, Third Party Advisory () https://github.com/dignajar/nibbleblog/issues/131 - Exploit, Third Party Advisory

Information

Published : 2018-09-06 16:29

Updated : 2024-11-21 03:53


NVD link : CVE-2018-16604

Mitre link : CVE-2018-16604

CVE.ORG link : CVE-2018-16604


JSON object : View

Products Affected

nibbleblog

  • nibbleblog
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')