CVE-2009-0677

RavenNuke 2.30 - Authenticated RCE

Title source: llm
STIX 2.1

Description

avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.

Exploits (1)

exploitdb WRITEUP VERIFIED
by waraxe · textwebappsphp
https://www.exploit-db.com/exploits/8068

References (8)

Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/33787
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33928
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/52007
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/500988/100/0/threaded
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/8068
Various Sources x_refsource_misc
http://www.waraxe.us/advisory-72.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/48789

Scores

EPSS 0.1687
EPSS Percentile 95.0%

Details

CWE
CWE-94
Status published
Products (1)
ravenphpscripts/ravennuke 2.30
Published Feb 22, 2009
Tracked Since Feb 18, 2026