DataLife Engine (DLE) 9.7 allows remote attackers to execute arbitrary PHP code via the catlist[] parameter to engine/preview.php, which is used in a preg_replace function call with an e modifier.
References
Configurations
Information
Published : 2014-06-02 08:55
Updated : 2014-06-03 05:27
NVD link : CVE-2013-1412
Mitre link : CVE-2013-1412
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
dleviet
- datalife_engine