Vulnerability Description
Eval injection vulnerability in the template engine for SysCP 1.2.10 and earlier allows remote attackers to execute arbitrary PHP code via a string containing the code within "{" and "}" (curly bracket) characters, which are processed by the PHP eval function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Syscp Team | Syscp | 1.2.10 |
References
- http://marc.info/?l=bugtraq&m=112352095923614&w=2
- http://www.hardened-php.net/advisory_132005.64.htmlVendor Advisory
- http://www.syscp.de/forum/viewtopic.php?t=1772Patch
- http://marc.info/?l=bugtraq&m=112352095923614&w=2
- http://www.hardened-php.net/advisory_132005.64.htmlVendor Advisory
- http://www.syscp.de/forum/viewtopic.php?t=1772Patch
FAQ
What is CVE-2005-2568?
CVE-2005-2568 is a vulnerability with a CVSS score of 7.5 (HIGH). Eval injection vulnerability in the template engine for SysCP 1.2.10 and earlier allows remote attackers to execute arbitrary PHP code via a string containing the code within "{" and "}" (curly bracke...
How severe is CVE-2005-2568?
CVE-2005-2568 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2568?
Check the references section above for vendor advisories and patch information. Affected products include: Syscp Team Syscp.