First published: Tue Nov 27 2018(Updated: )
PbootCMS V1.3.1 build 2018-11-14 allows remote attackers to execute arbitrary code via use of "eval" with mixed case, as demonstrated by an index.php/list/5/?current={pboot:if(evAl($_GET[a]))}1{/pboot:if}&a=phpinfo(); URI, because of an incorrect apps\home\controller\ParserController.php parserIfLabel protection mechanism.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pbootcms Pbootcms | =1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability severity of CVE-2018-19595 is critical with a score of 9.8.
CVE-2018-19595 allows remote attackers to execute arbitrary code by using the 'eval' function with mixed case in the URI.
PbootCMS version 1.3.1 is affected by CVE-2018-19595.
To fix CVE-2018-19595, users should update PbootCMS to a version that addresses the vulnerability.
Additional references for CVE-2018-19595 include: http://www.ttk7.cn/post-107.html, https://www.pbootcms.com/changelog.html, and https://www.pbootcms.com/content/139.html.