lib/execute/execSetResults.php in TestLink before 1.9.13 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the filter_result_result parameter.
References
Configurations
Information
Published : 2014-10-31 07:55
Updated : 2018-10-09 12:53
NVD link : CVE-2014-8081
Mitre link : CVE-2014-8081
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
testlink
- testlink