The installer script in webEdition CMS before 6.2.7-s1 and 6.3.x before 6.3.8-s1 allows remote attackers to conduct PHP Object Injection attacks by intercepting a request to update.webedition.org.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2014/May/147 | mailing list third party advisory exploit |
http://packetstormsecurity.com/files/126861/webEdition-CMS-2.8.0.0-Remote-Command-Execution.html | third party advisory vdb entry exploit |
http://www.securityfocus.com/bid/67692 | third party advisory vdb entry |
https://www.redteam-pentesting.de/advisories/rt-sa-2014-004 | third party advisory exploit |
http://www.securityfocus.com/archive/1/532230/100/0/threaded | mailing list third party advisory vdb entry exploit |