CVE-2009-0517
Published Feb 11, 2009
Last updated 6 years ago
Overview
- Description
- Eval injection vulnerability in index.php in phpSlash 0.8.1.1 and earlier allows remote attackers to execute arbitrary PHP code via the fields parameter, which is supplied to an eval function call within the generic function in include/class/tz_env.class. NOTE: some of these details are obtained from third party information.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:phpslash:phpslash:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "385ABF67-157E-4592-80E7-8399C4D72879" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CA61227-D278-4502-92ED-24C3E900FEC5", "versionEndIncluding": "0.8.1.1" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:0.5.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC8FB8A1-BE41-4E62-88E9-AB15246AB0FF" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68D5F330-5C61-4627-B925-272A357E1338" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:0.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9493398-C12A-439A-9836-0D62F6510D0B" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:0.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "506762E9-EAA6-4AFE-8F78-3FA6491C27F0" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:0.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31BDD3F6-789D-48AB-AD5C-137BB5D53BB5" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:0.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0292084B-B04A-4465-936B-51FFFE5328C8" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:0.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B370B91-6B3C-4423-ABE5-840999099D0A" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "703FD7D9-5D17-4C57-882A-8EF33CDE44F4" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:0.61:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF4822EC-378F-44B5-90E3-5B3F82247C92" }, { "criteria": "cpe:2.3:a:phpslash:phpslash:065:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BCF8850-3160-45C9-AA16-C785AFDB246C" } ], "operator": "OR" } ] } ]