Zikula Application Framework before 1.3.7 build 11 allows remote attackers to conduct PHP object injection attacks and delete arbitrary files or execute arbitrary PHP code via crafted serialized data in the (1) authentication_method_ser or (2) authentication_info_ser parameter to index.php, or (3) zikulaMobileTheme parameter to index.php.
References
Link | Resource |
---|---|
https://secuniaresearch.flexerasoftware.com/secunia_research/2014-2/ | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91787 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91786 | Third Party Advisory VDB Entry |
http://karmainsecurity.com/KIS-2014-02 | Third Party Advisory |
Configurations
Information
Published : 2018-03-26 11:29
Updated : 2018-04-24 05:57
NVD link : CVE-2014-2293
Mitre link : CVE-2014-2293
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
zikula
- zikula_application_framework