Vulnerabilities > CVE-2013-3629 - Unspecified vulnerability in Ispconfig 3.0.5.2

047910
CVSS 8.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
ispconfig
exploit available
metasploit

Summary

ISPConfig 3.0.5.2 has Arbitrary PHP Code Execution

Vulnerable Configurations

Part Description Count
Application
Ispconfig
1

Exploit-Db

descriptionISPConfig Authenticated Arbitrary PHP Code Execution. CVE-2013-3629. Remote exploit for php platform
idEDB-ID:29322
last seen2016-02-03
modified2013-10-31
published2013-10-31
reportermetasploit
sourcehttps://www.exploit-db.com/download/29322/
titleISPConfig Authenticated Arbitrary PHP Code Execution

Metasploit

descriptionISPConfig allows an authenticated administrator to export language settings into a PHP script which is intended to be reuploaded later to restore language settings. This feature can be abused to run aribitrary PHP code remotely on the ISPConfig server. This module was tested against version 3.0.5.2.
idMSF:EXPLOIT/MULTI/HTTP/ISPCONFIG_PHP_EXEC
last seen2020-05-20
modified2020-02-18
published2013-10-30
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/http/ispconfig_php_exec.rb
titleISPConfig Authenticated Arbitrary PHP Code Execution

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/123855/ispconfig_php_exec.rb.txt
idPACKETSTORM:123855
last seen2016-12-05
published2013-10-30
reporterBrandon Perry
sourcehttps://packetstormsecurity.com/files/123855/ISPConfig-Authenticated-Arbitrary-PHP-Code-Execution.html
titleISPConfig Authenticated Arbitrary PHP Code Execution