[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-5777Date: (C)2012-11-16   (M)2023-12-22


Eval injection vulnerability in the ReplaceListVars function in the template parser in e/class/connect.php in EmpireCMS 6.6 allows user-assisted remote attackers to execute arbitrary PHP code via a crafted template.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 8.6
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
http://archives.neohapsis.com/archives/bugtraq/2012-11/0027.html
BID-56406
empirecms-template-code-execution(79779)
http://packetstormsecurity.com/files/117902/EmpireCMS-6.6-PHP-Code-Execution.html
http://packetstormsecurity.org/files/117902/EmpireCMS-6.6-PHP-Code-Execution.html

CPE    1
cpe:/a:phome:empirecms:6.6
CWE    1
CWE-94

© SecPod Technologies