Multiple PHP remote file inclusion vulnerabilities in Atsphp 5.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the CONF[path] parameter to (1) index.php, (2) sources/usercp.php, or (3) sources/admin.php. NOTE: Another researcher has disputed this vulnerability, noting that CONF[path] is defined before use in index.php, that CONF[path] inclusion cannot occur through a direct request to other affected files, and that usercp.php is a typo of user_cp.php
References
Configurations
History
21 Nov 2024, 00:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/458581/100/100/threaded - | |
References | () http://www.securityfocus.com/archive/1/458600/100/0/threaded - |
07 Nov 2023, 02:00
Type | Values Removed | Values Added |
---|---|---|
Summary | Multiple PHP remote file inclusion vulnerabilities in Atsphp 5.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the CONF[path] parameter to (1) index.php, (2) sources/usercp.php, or (3) sources/admin.php. NOTE: Another researcher has disputed this vulnerability, noting that CONF[path] is defined before use in index.php, that CONF[path] inclusion cannot occur through a direct request to other affected files, and that usercp.php is a typo of user_cp.php |
Information
Published : 2007-02-07 22:28
Updated : 2024-11-21 00:26
NVD link : CVE-2007-0831
Mitre link : CVE-2007-0831
CVE.ORG link : CVE-2007-0831
JSON object : View
Products Affected
atsphp
- atsphp
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')