doping.php in ePing plugin 1.02 and earlier for e107 portal allows remote attackers to execute arbitrary code or overwrite files via (1) shell metacharacters in the eping_count parameter or (2) restricted shell metacharacters such as ">" and "&" in the eping_host parameter, which is not handled by the validation function.
References
Link | Resource |
---|---|
http://e107plugins.co.uk/news.php | Patch URL Repurposed |
http://marc.info/?l=bugtraq&m=112328161319148&w=2 | |
http://e107plugins.co.uk/news.php | Patch URL Repurposed |
http://marc.info/?l=bugtraq&m=112328161319148&w=2 |
Configurations
History
20 Nov 2024, 23:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://e107plugins.co.uk/news.php - Patch, URL Repurposed | |
References | () http://marc.info/?l=bugtraq&m=112328161319148&w=2 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://e107plugins.co.uk/news.php - Patch, URL Repurposed |
Information
Published : 2005-08-16 04:00
Updated : 2024-11-20 23:59
NVD link : CVE-2005-2559
Mitre link : CVE-2005-2559
CVE.ORG link : CVE-2005-2559
JSON object : View
Products Affected
e107
- e107
CWE