Eval injection vulnerability in the translation module (translator.php) in SiteBar 3.3.8 allows remote authenticated users to execute arbitrary PHP code via the edit parameter in an upd cmd action, a different vulnerability than CVE-2007-5492.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://secunia.com/advisories/27503 | third party advisory |
http://securityreason.com/securityalert/3318 | third party advisory |
http://www.securityfocus.com/archive/1/482499/100/0/threaded | mailing list |
http://osvdb.org/43604 | vdb entry |
http://www.gentoo.org/security/en/glsa/glsa-200711-05.xml | vendor advisory |
http://teamforge.net/viewcvs/viewcvs.cgi/tags/release-3.3.9/doc/history.txt?view=markup | patch |
http://www.securityfocus.com/bid/26126 | exploit vdb entry patch |
http://secunia.com/advisories/28008 | third party advisory |
http://www.debian.org/security/2007/dsa-1423 | vendor advisory |
http://www.vupen.com/english/advisories/2007/3768 | vdb entry |