Zero-day vulnerability in Revive Adserver

Arbitrary PHP code execution
CVE-2013-4211

The vulnerability has been exploited from November 2012 till August 2013.

Vulnerability details

Advisory: SB2013080601 - PHP code execution in OpenX Revive Adserver

Vulnerable component: Revive Adserver

CVE-ID: CVE-2013-4211

CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Description:

The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.

The weakness exists due to compromise of the source code package. A remote attacker can create a specially crafted request with a rot13'd and reversed payload and send it to the target system to execute arbitrary PHP code.

Successful exploitation of the vulnerability results in arbitrary PHP code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.

Public Exploits:

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.