Eval injection vulnerability in ip_cms/modules/standard/content_management/actions.php in ImpressPages CMS 1.0.12 and possibly other versons before 1.0.13 allows remote attackers to execute arbitrary code via the cm_group parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://secunia.com/advisories/46193 | third party advisory vendor advisory |
http://www.impresspages.org/news/impresspages-1-0-13-security-release/ | |
http://www.osvdb.org/75783 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/01/18/12 | mailing list |
http://www.securityfocus.com/bid/49798 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2012-01/0029.html | mailing list exploit |
http://www.openwall.com/lists/oss-security/2012/01/15/9 | mailing list |
http://seclists.org/bugtraq/2011/Sep/156 | mailing list |