In iPear, the manual execution of the eval() function can lead to command injection. Only PCs where commands are manually executed via "For Developers" are affected. This function allows executing any PHP code within iPear which may change, damage, or steal data (files) from the PC.
References
Link | Resource |
---|---|
https://github.com/yaBobJonez/iPear/security/advisories/GHSA-4xvp-35fx-hjjj | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-07-14 15:15
Updated : 2021-11-04 10:29
NVD link : CVE-2020-11084
Mitre link : CVE-2020-11084
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
ipear_project
- ipear