Multiple direct static code injection vulnerabilities in PHPGedView 3.3.7 and earlier allow remote attackers to execute arbitrary PHP code via (1) the username field in login.php, or the (2) user_language, (3) user_email, and (4) user_gedcomid parameters in login_register.php, which is directly inserted into authenticate.php.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/bid/15983 | vdb-entry x_refsource_BID |
| http://rgod.altervista.org/phpgedview_337_xpl.html | x_refsource_MISC |
| http://cvs.sourceforge.net/viewcvs.py/phpgedview/phpGedView/login_register.php?r1=1.71.2.36&r2=1.71.2.37 | x_refsource_CONFIRM |
| http://cvs.sourceforge.net/viewcvs.py/phpgedview/phpGedView/login_register.php?r1=1.71.2.35&r2=1.71.2.36 | x_refsource_CONFIRM |
| http://www.osvdb.org/22010 | vdb-entry x_refsource_OSVDB |
| http://www.securityfocus.com/archive/1/419906/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://secunia.com/advisories/18177 | third-party-advisory x_refsource_SECUNIA |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/23873 | vdb-entry x_refsource_XF |
| http://www.vupen.com/english/advisories/2005/3033 | vdb-entry x_refsource_VUPEN |
| http://securitytracker.com/id?1015395 | vdb-entry x_refsource_SECTRACK |
| https://sourceforge.net/tracker/index.php?func=detail&aid=1386434&group_id=55456&atid=477081 | x_refsource_CONFIRM |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|