The product uses a regular expression that either (1) contains an executable component with user-controlled inputs, or (2) allows a user to enable execution by inserting pattern modifiers.
Case (2) is possible in the PHP preg_replace() function, and possibly in other languages when a user-controlled input is inserted into a string that is later parsed as a regular expression.
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2006-2059
Executable regexp in PHP by inserting "e" modifier into first argument to preg_replace
CVE: CVE-2005-3420
Executable regexp in PHP by inserting "e" modifier into first argument to preg_replace
CVE: CVE-2006-2878
Complex curly syntax inserted into the replacement argument to PHP preg_replace(), which uses the "/e" modifier
CVE: CVE-2006-2908
Function allows remote attackers to execute arbitrary PHP code via the username field, which is used in a preg_replace function call with a /e (executable) modifier.
N/A
N/A
Phase | Note |
---|---|
Implementation | N/A |
N/A