CVE-2005-2568

Eval injection vulnerability in the template engine for SysCP 1.2.10 and earlier allows remote attackers to execute arbitrary PHP code via a string containing the code within "{" and "}" (curly bracket) characters, which are processed by the PHP eval function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:syscp_team:syscp:1.2.10:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=112352095923614&w=2 - () http://marc.info/?l=bugtraq&m=112352095923614&w=2 -
References () http://www.hardened-php.net/advisory_132005.64.html - Vendor Advisory () http://www.hardened-php.net/advisory_132005.64.html - Vendor Advisory
References () http://www.syscp.de/forum/viewtopic.php?t=1772 - Patch () http://www.syscp.de/forum/viewtopic.php?t=1772 - Patch

Information

Published : 2005-08-16 04:00

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2568

Mitre link : CVE-2005-2568

CVE.ORG link : CVE-2005-2568


JSON object : View

Products Affected

syscp_team

  • syscp