Vulnerability Description
htdocs/setup/index.php in Eventum before 2.3.5 allows remote attackers to inject and execute arbitrary PHP code via the hostname parameter.
CVSS Score
8.1
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eventum Project | Eventum | < 2.3.5 |
Related Weaknesses (CWE)
References
- http://bazaar.launchpad.net/~eventum-developers/eventum/trunk/revision/4665PatchThird Party Advisory
- http://www.securityfocus.com/archive/1/530891/100/0/threadedExploitThird Party AdvisoryVDB Entry
- https://bugs.launchpad.net/eventum/+bug/1271499ExploitIssue TrackingThird Party Advisory
- https://www.htbridge.com/advisory/HTB23198ExploitThird Party Advisory
- http://bazaar.launchpad.net/~eventum-developers/eventum/trunk/revision/4665PatchThird Party Advisory
- http://www.securityfocus.com/archive/1/530891/100/0/threadedExploitThird Party AdvisoryVDB Entry
- https://bugs.launchpad.net/eventum/+bug/1271499ExploitIssue TrackingThird Party Advisory
- https://www.htbridge.com/advisory/HTB23198ExploitThird Party Advisory
FAQ
What is CVE-2014-1632?
CVE-2014-1632 is a vulnerability with a CVSS score of 8.1 (HIGH). htdocs/setup/index.php in Eventum before 2.3.5 allows remote attackers to inject and execute arbitrary PHP code via the hostname parameter.
How severe is CVE-2014-1632?
CVE-2014-1632 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1632?
Check the references section above for vendor advisories and patch information. Affected products include: Eventum Project Eventum.