lib/execute/execSetResults.php in TestLink before 1.9.13 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the filter_result_result parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2014/Oct/105 | mailing list exploit patch |
https://gitorious.org/testlink-ga/testlink-code/commit/a519da3a45d80077e4eab957eb793b03652f57dc | |
http://karmainsecurity.com/KIS-2014-11 | patch exploit |
http://mantis.testlink.org/view.php?id=6651 | vendor advisory |
http://www.securityfocus.com/bid/70711 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/97727 | vdb entry |
http://www.securityfocus.com/archive/1/533798/100/0/threaded | mailing list |