An issue in phpkobo AjaxNewsTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the reque parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://ajaxnewsticker.com | product broken link |
http://phpkobo.com | product |
https://gist.github.com/RNPG/e11af10e1bd3606de8b568033d932589 | third party advisory exploit |