Akeneo PIM allows remote authenticated users to execute arbitrary PHP code by uploading a crafted image prior to v5.0.119 and v6.0.53. Community Edition users must change their Apache HTTP server configuration
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | Design/Logic Flaw | 9 Dec 202221:15 | – | prion |
![]() | CVE-2022-46157 | 9 Dec 202221:15 | – | osv |
![]() | Akeneo PIM Community Edition vulnerable to remote php code execution | 9 Dec 202220:08 | – | osv |
![]() | BIT-akeneo-2022-46157 | 6 Mar 202410:50 | – | osv |
![]() | CVE-2022-46157 | 9 Dec 202221:15 | – | cve |
![]() | Akeneo PIM Community Edition vulnerable to remote php code execution | 9 Dec 202220:08 | – | github |
![]() | Arbitrary Code Injection | 12 Dec 202204:21 | – | veracode |
![]() | Improper Control of Generation of Code ('Code Injection') | 9 Dec 202200:00 | – | gitlab |
![]() | CVE-2022-46157 Remote php code execution in Akeneo PIM | 9 Dec 202220:14 | – | cvelist |
![]() | CVE-2022-46157 | 5 Feb 202521:01 | – | redhatcve |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo