DataLife Engine (DLE) 9.7 allows remote attackers to execute arbitrary PHP code via the catlist[] parameter to engine/preview.php, which is used in a preg_replace function call with an e modifier.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/57603 | vdb entry |
http://www.exploit-db.com/exploits/24444 | exploit |
http://dleviet.com/dle/bug-fix/3281-security-patches-for-dle-97.html | patch vendor advisory |
http://osvdb.org/89662 | vdb entry |
http://www.exploit-db.com/exploits/24438 | exploit |
http://archives.neohapsis.com/archives/bugtraq/2013-01/0117.html | mailing list exploit |
http://karmainsecurity.com/KIS-2013-01 | exploit |
http://secunia.com/advisories/51971 | third party advisory |