CVE-2003-1385

ipchat.php in Invision Power Board 1.1.1 allows remote attackers to execute arbitrary PHP code, if register_globals is enabled, by modifying the root_path parameter to reference a URL on a remote web server that contains the code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:invision_power_services:invision_power_board:1.1.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:47

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0099.html - Exploit, Vendor Advisory () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0099.html - Exploit, Vendor Advisory
References () http://secunia.com/advisories/8182 - () http://secunia.com/advisories/8182 -
References () http://www.osvdb.org/3357 - () http://www.osvdb.org/3357 -
References () http://www.securityfocus.com/bid/6976 - () http://www.securityfocus.com/bid/6976 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/11435 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/11435 -

Information

Published : 2003-12-31 05:00

Updated : 2024-11-20 23:47


NVD link : CVE-2003-1385

Mitre link : CVE-2003-1385

CVE.ORG link : CVE-2003-1385


JSON object : View

Products Affected

invision_power_services

  • invision_power_board
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')