Eval injection vulnerability in the template engine for SysCP 1.2.10 and earlier allows remote attackers to execute arbitrary PHP code via a string containing the code within "{" and "}" (curly bracket) characters, which are processed by the PHP eval function.
Link | Tags |
---|---|
http://www.syscp.de/forum/viewtopic.php?t=1772 | patch |
http://marc.info/?l=bugtraq&m=112352095923614&w=2 | mailing list |
http://www.hardened-php.net/advisory_132005.64.html | vendor advisory |