Static code injection vulnerability in admin/configuration/modifier.php in zKup CMS 2.0 through 2.3 allows remote attackers to inject arbitrary PHP code into fichiers/config.php via a null byte (%00) in the login parameter in an ajout action, which bypasses the regular expression check.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.zkup.fr/actualite-zkup/maj-critique-v203v204.html | patch |
http://osvdb.org/43082 | vdb entry |
https://www.exploit-db.com/exploits/5220 | exploit |
http://secunia.com/advisories/29276 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/28149 | vdb entry exploit |