CVE-2013-5352
13.06.2014, 14:55
Sharetronix 3.1.1.3, 3.1.1, and earlier allows remote attackers to execute arbitrary PHP code via the (1) activities_text parameter to services/activities/set or (2) comments_text parameter to services/comments/set, which is not properly handled when executing the preg_replace function with the e modifier.
Vendor | Product | Version |
---|---|---|
sharetronix | sharetronix | 𝑥 ≤ 3.1.1 |
sharetronix | sharetronix | 3.1.1.3 |
𝑥
= Vulnerable software versions
References