PHP remote file inclusion vulnerability in data/inc/theme.php in Pluck 4.3, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the dir parameter. NOTE: A reliable third party disputes this vulnerability because the applicable include is within a function that does not receive the dir parameter from an HTTP request
References
Configurations
History
21 Nov 2024, 00:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://outlaw.aria-security.info/?p=12 - | |
References | () http://securityreason.com/securityalert/2973 - | |
References | () http://www.attrition.org/pipermail/vim/2007-August/001752.html - Exploit | |
References | () http://www.securityfocus.com/archive/1/475323/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/35756 - |
07 Nov 2023, 02:00
Type | Values Removed | Values Added |
---|---|---|
Summary | PHP remote file inclusion vulnerability in data/inc/theme.php in Pluck 4.3, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the dir parameter. NOTE: A reliable third party disputes this vulnerability because the applicable include is within a function that does not receive the dir parameter from an HTTP request |
Information
Published : 2007-08-08 01:17
Updated : 2024-11-21 00:34
NVD link : CVE-2007-4181
Mitre link : CVE-2007-4181
CVE.ORG link : CVE-2007-4181
JSON object : View
Products Affected
pluck
- pluck
CWE