Vulnerability Details CVE-2017-1000423
b2evolution version 6.6.0 - 6.8.10 is vulnerable to input validation (backslash and single quote escape) in basic install functionality resulting in unauthenticated attacker gaining PHP code execution on the victim's setup.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.018
EPSS Ranking 81.8%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2017-1000423
-
cpe:2.3:a:b2evolution:b2evolution:6.6.0
-
cpe:2.3:a:b2evolution:b2evolution:6.6.1
-
cpe:2.3:a:b2evolution:b2evolution:6.6.10
-
cpe:2.3:a:b2evolution:b2evolution:6.6.2
-
cpe:2.3:a:b2evolution:b2evolution:6.6.3
-
cpe:2.3:a:b2evolution:b2evolution:6.6.4
-
cpe:2.3:a:b2evolution:b2evolution:6.6.5
-
cpe:2.3:a:b2evolution:b2evolution:6.6.6
-
cpe:2.3:a:b2evolution:b2evolution:6.6.7
-
cpe:2.3:a:b2evolution:b2evolution:6.6.8
-
cpe:2.3:a:b2evolution:b2evolution:6.6.9
-
cpe:2.3:a:b2evolution:b2evolution:6.7.0
-
cpe:2.3:a:b2evolution:b2evolution:6.7.1
-
cpe:2.3:a:b2evolution:b2evolution:6.7.10
-
cpe:2.3:a:b2evolution:b2evolution:6.7.11
-
cpe:2.3:a:b2evolution:b2evolution:6.7.2
-
cpe:2.3:a:b2evolution:b2evolution:6.7.3
-
cpe:2.3:a:b2evolution:b2evolution:6.7.4
-
cpe:2.3:a:b2evolution:b2evolution:6.7.5
-
cpe:2.3:a:b2evolution:b2evolution:6.7.6
-
cpe:2.3:a:b2evolution:b2evolution:6.7.7
-
cpe:2.3:a:b2evolution:b2evolution:6.7.8
-
cpe:2.3:a:b2evolution:b2evolution:6.7.9
-
cpe:2.3:a:b2evolution:b2evolution:6.8.0
-
cpe:2.3:a:b2evolution:b2evolution:6.8.1
-
cpe:2.3:a:b2evolution:b2evolution:6.8.10
-
cpe:2.3:a:b2evolution:b2evolution:6.8.2
-
cpe:2.3:a:b2evolution:b2evolution:6.8.3
-
cpe:2.3:a:b2evolution:b2evolution:6.8.4
-
cpe:2.3:a:b2evolution:b2evolution:6.8.5
-
cpe:2.3:a:b2evolution:b2evolution:6.8.6
-
cpe:2.3:a:b2evolution:b2evolution:6.8.7
-
cpe:2.3:a:b2evolution:b2evolution:6.8.8
-
cpe:2.3:a:b2evolution:b2evolution:6.8.9