CVE-2014-1999
Published Jul 20, 2014
Last updated 10 years ago
Overview
- Description
- The auto-format feature in the Request_Curl class in FuelPHP 1.1 through 1.7.1 allows remote attackers to execute arbitrary code via a crafted response.
- Source
- vultures@jpcert.or.jp
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97FE4106-75CF-4C0D-911F-527D83495F63" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30E775D7-4D20-4B26-A197-E1CB49FA13AE" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.2:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11538B6D-47A8-4784-A66E-D62AD6763EF9" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A43A5008-97CA-4C16-8742-CFC107155F6A" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8712C222-1039-4BB2-BF9E-BAF32378E3A0" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15379F6C-5885-409D-815C-151A1CF0DE77" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "989B4F01-A5E0-49C4-8464-7F53FB37D816" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9FA1E7A-6D35-4BCC-812E-C34CF99DE914" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE97A650-6417-49A4-9CA0-E21DDCDC1483" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A20CE927-1578-48BE-9457-A1AC4807BA55" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE7AB4D8-C52C-4091-8161-6A6697A554FC" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB9D20F8-17A6-4A8B-BCCD-FB4ADFF934DD" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4ECD363D-EE04-4923-A56F-3E6F0D53ED01" }, { "criteria": "cpe:2.3:a:fuelphp:fuelphp:1.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FDE516C-9710-496F-92AF-BA8EA65038C4" } ], "operator": "OR" } ] } ]