vendor:
DataLife Engine
by:
Egidio Romano
7,5
CVSS
HIGH
PHP Code Injection
94
CWE
Product Name: DataLife Engine
Affected Version From: 9.7
Affected Version To: 9.7
Patch Exists: YES
Related CWE: CVE-2013-1412
CPE: dleviet:datalife_engine
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2013
DataLife Engine 9.7 (preview.php) PHP Code Injection Vulnerability
User supplied input passed through the $_REQUEST['catlist'] parameter is not properly sanitized before being used in a preg_replace() call with the e modifier at lines 249 and 253. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires a template which contains a “catlist” (or a “not-catlist”) tag.
Mitigation:
Apply the vendor patch: http://dleviet.com/dle/bug-fix/3281-security-patches-for-dle-97.html