First published: Fri Jan 23 2009(Updated: )
Eval injection vulnerability in library/setup/rpc.php in Gravity Getting Things Done (GTD) 0.4.5 and earlier allows remote attackers to execute arbitrary PHP code via the objectname parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gravity Forms | =0.2-beta | |
Gravity Forms | =0.3 | |
Gravity Forms | =0.4 | |
Gravity Forms | <=0.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5963 is considered a critical vulnerability due to the potential for remote code execution.
To fix CVE-2008-5963, update the Gravity Getting Things Done (GTD) software to version 0.4.6 or later.
CVE-2008-5963 affects Gravity Getting Things Done (GTD) versions 0.4.5 and earlier.
Yes, CVE-2008-5963 can be exploited remotely by attackers to execute arbitrary PHP code.
The impact of CVE-2008-5963 includes unauthorized execution of PHP code, which can compromise the security of your web application.