CVE-2011-4825
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
15/12/2011
Last modified:
11/04/2025
Description
Static code injection vulnerability in inc/function.base.php in Ajax File and Image Manager before 1.1, as used in tinymce before 1.4.2, phpMyFAQ 2.6 before 2.6.19 and 2.7 before 2.7.1, and possibly other products, allows remote attackers to inject arbitrary PHP code into data.php via crafted parameters.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:*:*:*:*:*:*:*:* | 1.0 (including) | |
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.5.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.5.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.6.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.7.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.7.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.8.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.8.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.8.24:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:1.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:phpletter:ajax_file_and_image_manager:1.0:beta2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.exploit-db.com/exploits/18075
- http://www.phpletter.com/en/DOWNLOAD/1/
- http://www.phpmyfaq.de/advisory_2011-10-25.php
- http://www.securityfocus.com/bid/50523
- http://www.zenphoto.org/trac/ticket/2005
- http://www.exploit-db.com/exploits/18075
- http://www.phpletter.com/en/DOWNLOAD/1/
- http://www.phpmyfaq.de/advisory_2011-10-25.php
- http://www.securityfocus.com/bid/50523
- http://www.zenphoto.org/trac/ticket/2005



