vendor:
N/A
by:
ryat#www.80vul.com
7,5
CVSS
HIGH
Evaluate Replacement String Vulnerability
94
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
mb_ereg(i)_replace() evaluate replacement string vulnerability
When the option parameter is set to 'e', matches are not escaped, allowing attackers to inject malicious code into the application. For example, in the given code snippet, the phpinfo() function will be evaluated. In the preg_replace() function, matches are escaped by the addslashes() function, preventing malicious code injection.
Mitigation:
Ensure that the option parameter is not set to 'e' when using the mb_ereg_replace() function.