7.5
CVSSv2

CVE-2012-5223

Published: 01/10/2012 Updated: 29/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The proc_deutf function in includes/functions_vbseocp_abstract.php in vBSEO 3.5.0, 3.5.1, 3.5.2, 3.6.0, and previous versions allows remote malicious users to insert and execute arbitrary PHP code via "complex curly syntax" in the char_repl parameter, which is inserted into a regular expression that is processed by the preg_replace function with the eval switch.

Vulnerable Product Search on Vulmon Subscribe to Product

crawlability vbseo 3.5.0

crawlability vbseo 3.3.0

crawlability vbseo 3.0.0

crawlability vbseo 2.3.0

crawlability vbseo 2.2.0

crawlability vbseo 3.1.0

crawlability vbseo 3.5.1

crawlability vbseo 3.6.0

crawlability vbseo 3.2.0

crawlability vbseo 2.0.0

crawlability vbseo

crawlability vbseo 3.5.2

crawlability vbseo 2.4.5

crawlability vbseo 2.4.0

crawlability vbseo 3.3.1

crawlability vbseo 2.1.1

crawlability vbseo 2.1.0

Exploits

require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'vBSEO <= 360 "proc_deutf()" Remote PHP Code Injection', 'Description' => %q{ This module exploits a vulnerability in the 'proc_deutf()' functio ...