First published: Mon Feb 11 2019(Updated: )
An issue was discovered in Metinfo 6.x. An attacker can leverage a race condition in the backend database backup function to execute arbitrary PHP code via admin/index.php?n=databack&c=index&a=dogetsql&tables=<?php and admin/databack/bakup_tables.php?2=file_put_contents URIs because app/system/databack/admin/index.class.php creates bakup_tables.php temporarily.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Metinfo Metinfo | >=6.0.0<=6.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7718 is a vulnerability discovered in Metinfo 6.x that allows an attacker to execute arbitrary PHP code.
CVE-2019-7718 has a severity score of 8.1, which is considered high.
Metinfo version 6.0.0 to 6.1.3 is affected by CVE-2019-7718.
An attacker can exploit CVE-2019-7718 by leveraging a race condition in the backend database backup function and executing arbitrary PHP code.
Currently, there is no known fix for CVE-2019-7718. It is recommended to update to a secure version or apply any patches provided by the vendor.