Eval injection vulnerability in reserve.php in phpScheduleIt 1.2.10 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via the start_date parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/reserve.php?r1=318&r2=328 | |
http://www.exploit-db.com/exploits/18037 | exploit |
http://www.osvdb.org/48797 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45617 | vdb entry |
http://www.exploit-db.com/exploits/6646 | exploit |
http://secunia.com/advisories/32073 | third party advisory vendor advisory |
http://sourceforge.net/project/shownotes.php?release_id=662749 | |
http://www.securityfocus.com/bid/31520 | vdb entry exploit |