Secunia Security Advisory - A vulnerability has been reported in phpCodeGenie, which can be exploited by malicious people to compromise a vulnerable system.
a8a79c04fa825747cfb508cb1d5e3ffec13f2093c2e567b747abef37119800b3
TITLE:
phpCodeGenie "Simple Application Generation" Code Execution
Vulnerability
SECUNIA ADVISORY ID:
SA12853
VERIFY ADVISORY:
http://secunia.com/advisories/12853/
CRITICAL:
Less critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
phpCodeGenie 3.x
http://secunia.com/product/4141/
DESCRIPTION:
A vulnerability has been reported in phpCodeGenie, which can be
exploited by malicious people to compromise a vulnerable system.
Input to the headers and footers is written to PHP files and is
interpreted as PHP code when the scripts are accessed through the web
server. This can be exploited to execute arbitrary code on a
vulnerable system.
NOTE: This advisory has been rated "less critical", because
phpCodeGenie is intended for development purposes and should not be
put on production systems nor publicly available servers.
The vulnerability has been confirmed on version 3.0. Other versions
may also be vulnerable.
SOLUTION:
Update to version 3.0.2.
http://phpcodegenie.sourceforge.net/downloads.php
PROVIDED AND/OR DISCOVERED BY:
César Guirao Robles
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------