CVE-2014-8731
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
23/03/2017
Last modified:
20/04/2025
Description
PHPMemcachedAdmin 1.2.2 and earlier allows remote attackers to execute arbitrary PHP code via vectors related "serialized data and the last part of the concatenated filename," which creates a file in webroot.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:phpmemcachedadmin_project:phpmemcachedadmin:*:*:*:*:*:*:*:* | 1.2.2 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/129089/PHPMemcachedAdmin-1.2.2-Remote-Code-Execution.html
- http://www.securityfocus.com/archive/1/533968/100/0/threaded
- http://www.securityfocus.com/archive/1/533980/100/0/threaded
- http://www.securityfocus.com/bid/71059
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98638
- http://packetstormsecurity.com/files/129089/PHPMemcachedAdmin-1.2.2-Remote-Code-Execution.html
- http://www.securityfocus.com/archive/1/533968/100/0/threaded
- http://www.securityfocus.com/archive/1/533980/100/0/threaded
- http://www.securityfocus.com/bid/71059
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98638



