Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-6132

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2008-6132
Last Modified 05 Nov 2012 11:14:37
Published 13 Feb 2009 01:30:04
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2008-6132

Summary

Eval injection vulnerability in reserve.php in phpScheduleIt 1.2.10 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via the start_date parameter.

Vulnerable Systems

Application

  • Brickhost Phpscheduleit 1.0

  • Brickhost Phpscheduleit 1.0 Rc1

  • Brickhost Phpscheduleit 1.0.0rc1

  • Brickhost Phpscheduleit 1.2.0

  • Brickhost Phpscheduleit 1.2.1

  • Brickhost Phpscheduleit 1.2.10

  • Brickhost Phpscheduleit 1.2.2

  • Brickhost Phpscheduleit 1.2.3

  • Brickhost Phpscheduleit 1.2.4

  • Brickhost Phpscheduleit 1.2.5

  • Brickhost Phpscheduleit 1.2.6

  • Brickhost Phpscheduleit 1.2.7

  • Brickhost Phpscheduleit 1.2.8

  • Brickhost Phpscheduleit 1.2.9


References

XF - phpscheduleit-reserve-code-execution(45617)

BID - 31520

MILW0RM - 6646

CONFIRM - http://sourceforge.net/project/shownotes.php?release_id=662749

SECUNIA - 32073

CONFIRM - http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/reserve.php?r1=318&r2=328

OSVDB - 48797

EXPLOIT-DB - 18037


Last Updated: 27 May 2016 10:58:25