FUNC.pm in IkonBoard 3.1.2a and earlier, including 3.1.1, does not properly cleanse the "lang" cookie when it contains illegal characters, which allows remote attackers to execute arbitrary code when the cookie is inserted into a Perl "eval" statement.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=106381136115972&w=2 | |
http://www.securityfocus.com/archive/1/317234 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/336598 | |
http://marc.info/?l=bugtraq&m=106381136115972&w=2 | |
http://www.securityfocus.com/archive/1/317234 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/336598 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=106381136115972&w=2 - | |
References | () http://www.securityfocus.com/archive/1/317234 - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/336598 - |
Information
Published : 2003-09-22 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-0770
Mitre link : CVE-2003-0770
CVE.ORG link : CVE-2003-0770
JSON object : View
Products Affected
ikonboard.com
- ikonboard
CWE