A Code Execution Vulnerability exists in OpenX Ad Server 2.8.10 due to a backdoor in flowplayer-3.1.1.min.js library, which could let a remote malicious user execute arbitrary PHP code
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/61650 | vdb entry third party advisory |
http://www.exploit-db.com/exploits/27529 | exploit vdb entry third party advisory |
http://www.openwall.com/lists/oss-security/2013/08/07/2 | third party advisory mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/86259 | vdb entry third party advisory |
https://packetstormsecurity.com/files/cve/CVE-2013-4211 | exploit vdb entry third party advisory |