PHP code injection in b2evolution

Published: 2018-01-03 18:16:45
Severity Medium
Patch available YES
Number of vulnerabilities 1
CVSSv2 5.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
CVSSv3 7 [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE ID CVE-2017-1000423
CWE ID CWE-20
Exploitation vector Network
Public exploit Not available
Vulnerable software b2evolution
Vulnerable software versions b2evolution 6.6.0
b2evolution 6.6.1
b2evolution 6.6.2
Show more
Vendor URL b2evolution.net
Advisory type Public

Security Advisory

1) Input validation error

Description

The vulnerability allows a remote attacker to execute arbitrary PHP code.

The vulnerability exists due to improper input validation (backslash and single quote escape) in basic install functionality. A remote attacker can execute arbitrary PHP code.

Remediation

Install update from vendor's website.

External links

https://github.com/b2evolution/b2evolution/commit/0096a3ebc85f6aadbda2c4427cd092a538b161d2
https://github.com/b2evolution/b2evolution/commit/b899d654d931f3bf3cfbbdd71e0d1a0f3a16d04c

Back to List