Description
avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.
Exploits (1)
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33787
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33928
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/52007
Vendor Advisory x_refsource_confirm
http://ravenphpscripts.com/postt17156.html&sid=12d1201371612260a42fa846ebce7bad
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/500988/100/0/threaded
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/8068
Various Sources x_refsource_misc
http://www.waraxe.us/advisory-72.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/48789
Scores
EPSS
0.1687
EPSS Percentile
95.0%
Details
CWE
CWE-94
Status
published
Products (1)
ravenphpscripts/ravennuke
2.30
Published
Feb 22, 2009
Tracked Since
Feb 18, 2026