lib/execute/execSetResults.php in TestLink before 1.9.13 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the filter_result_result parameter.
References
Configurations
History
21 Nov 2024, 02:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://karmainsecurity.com/KIS-2014-11 - Exploit, Patch | |
References | () http://mantis.testlink.org/view.php?id=6651 - Vendor Advisory | |
References | () http://seclists.org/fulldisclosure/2014/Oct/105 - Exploit, Patch | |
References | () http://www.securityfocus.com/archive/1/533798/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/70711 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/97727 - | |
References | () https://gitorious.org/testlink-ga/testlink-code/commit/a519da3a45d80077e4eab957eb793b03652f57dc - |
Information
Published : 2014-10-31 14:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-8081
Mitre link : CVE-2014-8081
CVE.ORG link : CVE-2014-8081
JSON object : View
Products Affected
testlink
- testlink
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')