Invision Power Board (IPB) before 2.1.6 allows remote attackers to execute arbitrary PHP script via attack vectors involving (1) the post_icon variable in classes/post/class_post.php and (2) the df value in action_public/moderate.php.
Link | Tags |
---|---|
http://www.osvdb.org/25668 | vdb entry |
http://forums.invisionpower.com/index.php?showtopic=215527 | patch |
http://attrition.org/pipermail/vim/2006-May/000776.html | mailing list |
http://www.securityfocus.com/bid/18040 | vdb entry |
http://www.vupen.com/english/advisories/2006/1859 | vdb entry |
http://secunia.com/advisories/20158 | patch vendor advisory third party advisory |
http://www.osvdb.org/25667 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26541 | vdb entry |
http://forums.invisionpower.com/index.php?act=Attach&type=post&id=10026 | patch |