An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").
References
Link | Resource |
---|---|
https://github.com/dignajar/nibbleblog/issues/131 | Exploit Third Party Advisory |
https://github.com/dignajar/nibbleblog/issues/131 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dignajar/nibbleblog/issues/131 - Exploit, Third Party Advisory |
Information
Published : 2018-09-06 16:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-16604
Mitre link : CVE-2018-16604
CVE.ORG link : CVE-2018-16604
JSON object : View
Products Affected
nibbleblog
- nibbleblog
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')