Vulnerability Details : CVE-2014-5519
Public exploit exists!
The Ploticus module in PhpWiki 1.5.0 allows remote attackers to execute arbitrary code via shell metacharacters in a device option in the edit[content] parameter to index.php/HeIp. NOTE: some of these details are obtained from third party information.
Vulnerability category: Execute code
Products affected by CVE-2014-5519
- cpe:2.3:a:phpwiki_project:phpwiki:1.5.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5519
82.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-5519
-
Phpwiki Ploticus Remote Code Execution
Disclosure Date: 2014-09-11First seen: 2020-04-26exploit/multi/http/phpwiki_ploticus_execThe Ploticus module in PhpWiki 1.5.0 allows remote attackers to execute arbitrary code via command injection. Authors: - Benjamin Harris - us3r777 <us3r777@n0b0.so>
CVSS scores for CVE-2014-5519
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-5519
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5519
-
http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html
PhpWiki Ploticus Command Injection ≈ Packet StormExploit
-
http://www.exploit-db.com/exploits/34451
PhpWiki - Remote Command Execution - PHP webapps ExploitExploit
-
http://secunia.com/advisories/60293
Sign in
-
http://seclists.org/oss-sec/2014/q3/465
oss-sec: Re: PHP-Wiki Command InjectionExploit
-
http://seclists.org/fulldisclosure/2014/Aug/77
Full Disclosure: PHP-Wiki Command InjectionExploit
-
http://seclists.org/oss-sec/2014/q3/456
oss-sec: PHP-Wiki Command InjectionExploit
-
http://osvdb.org/show/osvdb/110576
Jump to