7.5

CVE-2011-1513

Exploit

Static code injection vulnerability in install_.php in e107 CMS 0.7.24 and probably earlier versions, when the installation script is not removed, allows remote attackers to inject arbitrary PHP code into e107_config.php via a crafted MySQL server name.

Data is provided by the National Vulnerability Database (NVD)
E107E107 Version <= 0.7.24
E107E107 Version0.7
E107E107 Version0.7.0
E107E107 Version0.7.1
E107E107 Version0.7.2
E107E107 Version0.7.3
E107E107 Version0.7.4
E107E107 Version0.7.5
E107E107 Version0.7.6
E107E107 Version0.7.7
E107E107 Version0.7.8
E107E107 Version0.7.9
E107E107 Version0.7.10
E107E107 Version0.7.11
E107E107 Version0.7.12
E107E107 Version0.7.13
E107E107 Version0.7.14
E107E107 Version0.7.15
E107E107 Version0.7.16
E107E107 Version0.7.17
E107E107 Version0.7.18
E107E107 Version0.7.19
E107E107 Version0.7.20
E107E107 Version0.7.21
E107E107 Version0.7.22
E107E107 Version0.545
E107E107 Version0.547 Updatebeta
E107E107 Version0.548 Updatebeta
E107E107 Version0.549 Updatebeta
E107E107 Version0.551 Updatebeta
E107E107 Version0.552 Updatebeta
E107E107 Version0.553 Updatebeta
E107E107 Version0.554
E107E107 Version0.554 Updatebeta
E107E107 Version0.555 Updatebeta
E107E107 Version0.600
E107E107 Version0.601
E107E107 Version0.602
E107E107 Version0.603
E107E107 Version0.604
E107E107 Version0.605
E107E107 Version0.606
E107E107 Version0.607
E107E107 Version0.608
E107E107 Version0.609
E107E107 Version0.610
E107E107 Version0.611
E107E107 Version0.612
E107E107 Version0.613
E107E107 Version0.614
E107E107 Version0.615
E107E107 Version0.615a
E107E107 Version0.616
E107E107 Version0.617
E107E107 Version0.6171
E107E107 Version0.6172
E107E107 Version0.6173
E107E107 Version0.6174
E107E107 Version0.6175
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.36% 0.795
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.