PHPMemcachedAdmin versions 1.2.2 and below suffer from a remote code execution vulnerability.
19d87edb296c6abb43991e0a8e2a208e67c071926458b687ba07422d91852a16
CVE-2014-8731
CVSSv2 Vector:
[AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:U/RC:C]
CVSSv2 Base Score=10.0
CVSSv2 Temp Score=9.5
OWASP Top 10 classification: A1 - Injection
PHPMemcachedAdmin is a web-based frontend for Linux's memcached Daemon.
Project Homepage:
https://code.google.com/p/phpmemcacheadmin/
Download Site:
http://blog.elijaa.org/index.php?pages/phpMemcachedAdmin-Download
PHPMemcachedAdmin stores data in the server's filesystem.
Part of the serialized data and the last part of the concatenated filename may be specified by the user, which can lead to remote code execution e.g. if a php script is created and placed within the webserver's document root.
All versions prior and including the current version 1.2.2 are affected as far as we know.