Description
PbootCMS 1.2.2 allows remote attackers to execute arbitrary PHP code by specifying a .php filename in a "SET GLOBAL general_log_file" statement, followed by a SELECT statement containing this PHP code.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-10770 | PbootCMS 1.2.2 allows remote attackers to execute arbitrary PHP code by specifying a .php filename in a "SET GLOBAL general_log_file" statement, followed by a SELECT statement containing this PHP code. |
References
| Link | Providers |
|---|---|
| https://github.com/Pbootcms/Pbootcms/issues/2 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:30:03.686Z
Reserved: 2018-11-06T00:00:00.000Z
Link: CVE-2018-19053
No data.
Status : Modified
Published: 2018-11-07T05:29:00.373
Modified: 2024-11-21T03:57:14.180
Link: CVE-2018-19053
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD