An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").
References
Link | Resource |
---|---|
https://github.com/dignajar/nibbleblog/issues/131 | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-09-06 09:29
Updated : 2018-11-14 06:38
NVD link : CVE-2018-16604
Mitre link : CVE-2018-16604
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
nibbleblog
- nibbleblog