Multiple eval injection vulnerabilities in phpScheduleIt before 1.2.11 allow remote attackers to execute arbitrary code via (1) the end_date parameter to reserve.php and (2) the start_date and end_date parameters to check.php. NOTE: the start_date/reserve.php vector is already covered by CVE-2008-6132.
References
Link | Resource |
---|---|
http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/check.php?r1=318&r2=332 | Patch Vendor Advisory |
http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/reserve.php?r1=318&r2=328 | Patch Vendor Advisory |
http://secunia.com/advisories/33991 | Vendor Advisory |
http://sourceforge.net/project/shownotes.php?release_id=662749 | Patch |
http://www.vupen.com/english/advisories/2009/0491 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2009-03-05 02:30
Updated : 2024-02-04 17:33
NVD link : CVE-2009-0820
Mitre link : CVE-2009-0820
CVE.ORG link : CVE-2009-0820
JSON object : View
Products Affected
php.brickhost
- phpscheduleit
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')