vendor:
Journalness
by:
Iron
8.8
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: Journalness
Affected Version From: 4.1 and below
Affected Version To: 4.1 and below
Patch Exists: YES
Related CWE: N/A
CPE: a:journalness:journalness
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Journalness <= 4.1 Remote Code Execution exploit
This exploit allows remote attackers to execute arbitrary code on vulnerable installations of Journalness. Authentication is not required to exploit this vulnerability. The vulnerability is due to the 'includes/database/adodb-perf-module.inc.php' script not properly sanitizing user-supplied input to the 'last_module' parameter. An attacker can exploit this vulnerability to execute arbitrary code under the context of the webserver process.
Mitigation:
Upgrade to the latest version of Journalness or apply the patch from the vendor.