Pixel.Motion.Config.PHP.Command.Execution

description-logoDescription

This indicates an atttempt to exploit a static code injection vulnerability in Blog Pixel Motion 2.1.1.
A static code injection vulnerability in config.php, in Blog Pixel Motion 2.1.1, allows remote attackers to execute arbitrary PHP code via the "nom_blog" parameter, which is injected into include/variables.php.

affected-products-logoAffected Products

Pixel Motion 2.1.1

Impact logoImpact

System compromise: remote code execution.

recomended-action-logoRecommended Actions

Currently we are not aware of any vendor supplied patches for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)