Description
GolemCMS through 2008-12-24, if the install/ directory remains active after an installation, allows remote attackers to execute arbitrary PHP code by inserting this code into the "Database Information" "Table prefix" form field, or obtain sensitive information via a direct request for install/install.sql.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-6486 | GolemCMS through 2008-12-24, if the install/ directory remains active after an installation, allows remote attackers to execute arbitrary PHP code by inserting this code into the "Database Information" "Table prefix" form field, or obtain sensitive information via a direct request for install/install.sql. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T17:23:49.034Z
Reserved: 2018-07-24T00:00:00.000Z
Link: CVE-2018-14579
No data.
Status : Modified
Published: 2018-07-24T14:29:00.207
Modified: 2024-11-21T03:49:20.600
Link: CVE-2018-14579
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD