Name | CVE-2005-0887 |
Description | Eval injection vulnerability in Double Choco Latte before 0.9.4.3 allows remote attackers to execute arbitrary PHP code via the menuAction variable in (1) functions.inc.php or (2) main.php, which causes code to be injected into an eval statement. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
dcl (PTS) | bullseye | 7.4.1-1 | fixed |
| bookworm | 7.5.1-1 | fixed |
| sid, trixie | 7.5.1-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
dcl | source | (unstable) | (not affected) | | | |
Notes
- dcl <not-affected> (Vulnerable code not present, affected dcl "Double Choco Latte")
Until 2008 src:dcl was for the source for "Double Choco Latte". On
2017-08-30 an unrelated source took over the source package name dcl.
Original issue fixed in dcl/1:0.9.4.4-1