Discuz!ML 3.2 through 3.4 allows remote attackers to execute arbitrary PHP code via a modified language cookie, as demonstrated by changing 4gH4_0df5_language=en to 4gH4_0df5_language=en’.phpinfo().'; (if the random prefix 4gH4_0df5_ were used).
CPE | Name | Operator | Version |
---|---|---|---|
discuz\\!ml | ge | 3.2 | |
discuz\\!ml | le | 3.4 |