Vulnerability Description
lib/execute/execSetResults.php in TestLink before 1.9.13 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the filter_result_result parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Testlink | Testlink | <= 1.9.12 |
Related Weaknesses (CWE)
References
- http://karmainsecurity.com/KIS-2014-11ExploitPatch
- http://mantis.testlink.org/view.php?id=6651Vendor Advisory
- http://seclists.org/fulldisclosure/2014/Oct/105ExploitPatch
- http://www.securityfocus.com/archive/1/533798/100/0/threaded
- http://www.securityfocus.com/bid/70711
- https://exchange.xforce.ibmcloud.com/vulnerabilities/97727
- https://gitorious.org/testlink-ga/testlink-code/commit/a519da3a45d80077e4eab957e
- http://karmainsecurity.com/KIS-2014-11ExploitPatch
- http://mantis.testlink.org/view.php?id=6651Vendor Advisory
- http://seclists.org/fulldisclosure/2014/Oct/105ExploitPatch
- http://www.securityfocus.com/archive/1/533798/100/0/threaded
- http://www.securityfocus.com/bid/70711
- https://exchange.xforce.ibmcloud.com/vulnerabilities/97727
- https://gitorious.org/testlink-ga/testlink-code/commit/a519da3a45d80077e4eab957e
FAQ
What is CVE-2014-8081?
CVE-2014-8081 is a vulnerability with a CVSS score of 7.5 (HIGH). lib/execute/execSetResults.php in TestLink before 1.9.13 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the filter_result_result parameter.
How severe is CVE-2014-8081?
CVE-2014-8081 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8081?
Check the references section above for vendor advisories and patch information. Affected products include: Testlink Testlink.