PAJAX.Arbitrary.PHP.Code.Execution

description-logoDescription

This is an attack attempt against a vulnerability in PAJAX.
This issue is triggered when PHP code is included in the 'method' and 'args' variables, which may lead to a loss of integrity. An attacker may exploit this to gain access to unauthorized privileges.

affected-products-logoAffected Products

PAJAX PAJAX 0.5.1

Impact logoImpact

Attackers can execute arbitrary PHP code to gain unauthorized access.

recomended-action-logoRecommended Actions

Upgrade to version 0.5.2 or higher, as it has been reported to fix this vulnerability.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)