Threat Encyclopedia
Pixel.Motion.Config.PHP.Command.Execution
Description
This indicates an atttempt to exploit a static code injection vulnerability in Blog Pixel Motion 2.1.1.
A static code injection vulnerability in config.php, in Blog Pixel Motion 2.1.1, allows remote attackers to execute arbitrary PHP code via the "nom_blog" parameter, which is injected into include/variables.php.
Affected Products
Pixel Motion 2.1.1
Impact
System compromise: remote code execution.
Recommended Actions
Currently we are not aware of any vendor supplied patches for this issue.