Eval injection vulnerability in index.php in ClanSys 1.1 allows remote attackers to execute arbitrary PHP code via PHP code in the page parameter, as demonstrated by using an "include" statement that is injected into the eval statement. NOTE: this issue has been described as file inclusion by some sources, but that is just one attack; the primary vulnerability is eval injection.
References
Configurations
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/782 - | |
References | () http://securitytracker.com/id?1015988 - Exploit | |
References | () http://www.nukedx.com/?getxpl=29 - Exploit | |
References | () http://www.osvdb.org/25083 - | |
References | () http://www.securityfocus.com/archive/1/431873/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17660 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25976 - |
Information
Published : 2006-04-25 12:50
Updated : 2024-11-21 00:10
NVD link : CVE-2006-2005
Mitre link : CVE-2006-2005
CVE.ORG link : CVE-2006-2005
JSON object : View
Products Affected
clansys
- clansys
CWE