tiki-graph_formula.php in TikiWiki 1.9.8 allows remote attackers to execute arbitrary code via PHP sequences in the f array parameter, which are processed by create_function.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.gentoo.org/security/en/glsa/glsa-200710-21.xml | vendor advisory |
http://www.vupen.com/english/advisories/2007/3492 | vdb entry |
http://securityvulns.ru/Sdocument162.html | exploit |
http://www.securityfocus.com/archive/1/482006/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/26006 | vdb entry exploit |
http://secunia.com/advisories/27344 | third party advisory |
http://bugs.gentoo.org/show_bug.cgi?id=195503 | |
http://osvdb.org/40478 | vdb entry |
http://securityreason.com/securityalert/3216 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37076 | vdb entry |
http://www.securityfocus.com/archive/1/482128/100/0/threaded | mailing list |
http://sourceforge.net/project/shownotes.php?release_id=546283&group_id=64258 | |
http://sourceforge.net/forum/forum.php?forum_id=744898 | |
https://www.exploit-db.com/exploits/4509 | exploit |
http://secunia.com/advisories/27190 | third party advisory |