SaveWebPortal 3.4 allows remote attackers to execute arbitrary PHP code via a direct request to admin/PhpMyExplorer/editerfichier.php, then editing the desired file to contain the PHP code, as demonstrated using header.php in the fichier parameter. NOTE: it is possible that this vulnerability stems from PhpMyExplorer, which is a separate package.
References
Link | Resource |
---|---|
http://rgod.altervista.org/save_yourself_from_savewebportal34.html | Exploit Vendor Advisory |
http://secunia.com/advisories/16522 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2005-08-24 04:00
Updated : 2024-02-28 10:42
NVD link : CVE-2005-2685
Mitre link : CVE-2005-2685
CVE.ORG link : CVE-2005-2685
JSON object : View
Products Affected
savewebportal
- savewebportal
CWE