vendor:
MyEvent
by:
b3g0k,Nistiman,flot,Netqurd etc.
7,5
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: MyEvent
Affected Version From: 1.2
Affected Version To: 1.2
Patch Exists: NO
Related CWE: None
CPE: a:myevent:myevent:1.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2006
MyEvent
A vulnerability in MyEvent 1.2 allows remote attackers to execute arbitrary code via a crafted myevent_path parameter in an event.php request. The vulnerability is due to insufficient sanitization of user-supplied input, which allows attackers to inject malicious code into the application. This code is then executed on the server.
Mitigation:
Input validation should be used to prevent code injection attacks. All input data should be validated and filtered, and special characters should be removed or escaped.