Vulnerability Description
Direct static code injection vulnerability in setcookie.php in PBLang 4.65, and possibly earlier versions, allows remote attackers to execute arbitrary PHP code via the username (u parameter), which is directly injected into a file that is later executed upon login.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pblang | Pblang | 4.65 |
References
- http://marc.info/?l=bugtraq&m=112611338417979&w=2
- http://secunia.com/advisories/16711/Vendor Advisory
- http://securitytracker.com/alerts/2005/Sep/1014861.htmlExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22187
- http://marc.info/?l=bugtraq&m=112611338417979&w=2
- http://secunia.com/advisories/16711/Vendor Advisory
- http://securitytracker.com/alerts/2005/Sep/1014861.htmlExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22187
FAQ
What is CVE-2005-2893?
CVE-2005-2893 is a vulnerability with a CVSS score of 7.5 (HIGH). Direct static code injection vulnerability in setcookie.php in PBLang 4.65, and possibly earlier versions, allows remote attackers to execute arbitrary PHP code via the username (u parameter), which i...
How severe is CVE-2005-2893?
CVE-2005-2893 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2893?
Check the references section above for vendor advisories and patch information. Affected products include: Pblang Pblang.