Intrusion Prevention

Pixel.Motion.Config.PHP.Command.Execution

Description

This indicates an atttempt to exploit a static code injection vulnerability in Blog Pixel Motion 2.1.1.
A static code injection vulnerability in config.php, in Blog Pixel Motion 2.1.1, allows remote attackers to execute arbitrary PHP code via the "nom_blog" parameter, which is injected into include/variables.php.

Affected Products

Pixel Motion 2.1.1

Impact

System compromise: remote code execution.

Recommended Actions

Currently we are not aware of any vendor supplied patches for this issue.

CVE References

CVE-2006-5085