Eval injection vulnerability in the flag_import_form_validate function in includes/flag.export.inc in the Flag module 7.x-3.0, 7.x-3.5, and earlier for Drupal allows remote authenticated administrators to execute arbitrary PHP code via the "Flag import code" text area to admin/structure/flags/import. NOTE: this issue could also be exploited by other attackers if the administrator ignores a security warning on the permissions assignment page.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/67318 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1096604 | |
http://seclists.org/fulldisclosure/2014/May/44 | exploit mailing list |
http://www.openwall.com/lists/oss-security/2014/05/12/2 | mailing list |