In iPear, the manual execution of the eval() function can lead to command injection. Only PCs where commands are manually executed via "For Developers" are affected. This function allows executing any PHP code within iPear which may change, damage, or steal data (files) from the PC.
References
Link | Resource |
---|---|
https://github.com/yaBobJonez/iPear/security/advisories/GHSA-4xvp-35fx-hjjj | Third Party Advisory |
https://github.com/yaBobJonez/iPear/security/advisories/GHSA-4xvp-35fx-hjjj | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:56
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.5
v3 : 6.4 |
References | () https://github.com/yaBobJonez/iPear/security/advisories/GHSA-4xvp-35fx-hjjj - Third Party Advisory |
Information
Published : 2020-07-14 22:15
Updated : 2024-11-21 04:56
NVD link : CVE-2020-11084
Mitre link : CVE-2020-11084
CVE.ORG link : CVE-2020-11084
JSON object : View
Products Affected
ipear_project
- ipear