wap/index.php in Crossday Discuz! Board 6.x and 7.x allows remote authenticated users to execute arbitrary PHP code via the creditsformula parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/32303 | vdb entry exploit |
http://osvdb.org/50202 | vdb entry |
https://www.exploit-db.com/exploits/7119 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46644 | vdb entry |
http://secunia.com/advisories/32731 | third party advisory vendor advisory |
http://www.80vul.com/dzvul/sodb/13/dz-exp-sodb-2008-13_php.htm | exploit |
http://www.discuz.net/archiver/?tid-1112426.html | exploit |