Arbitrary PHP Code Execution in Sharetronix 3.1.1.3 and Earlier

Arbitrary PHP Code Execution in Sharetronix 3.1.1.3 and Earlier

CVE-2013-5352 · MEDIUM Severity

AV:N/AC:M/AU:N/C:P/I:P/A:P

Sharetronix 3.1.1.3, 3.1.1, and earlier allows remote attackers to execute arbitrary PHP code via the (1) activities_text parameter to services/activities/set or (2) comments_text parameter to services/comments/set, which is not properly handled when executing the preg_replace function with the e modifier.

Learn more about our Web Application Penetration Testing UK.