ipchat.php in Invision Power Board 1.1.1 allows remote attackers to execute arbitrary PHP code, if register_globals is enabled, by modifying the root_path parameter to reference a URL on a remote web server that contains the code.
References
Configurations
History
20 Nov 2024, 23:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0099.html - Exploit, Vendor Advisory | |
References | () http://secunia.com/advisories/8182 - | |
References | () http://www.osvdb.org/3357 - | |
References | () http://www.securityfocus.com/bid/6976 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/11435 - |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:47
NVD link : CVE-2003-1385
Mitre link : CVE-2003-1385
CVE.ORG link : CVE-2003-1385
JSON object : View
Products Affected
invision_power_services
- invision_power_board
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')