Multiple PHP remote file inclusion vulnerabilities in PHPCentral Poll Script 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the _SERVER[DOCUMENT_ROOT] parameter in (1) poll.php and (2) pollarchive.php. NOTE: a reliable third party states that this issue is resultant from a variable extraction error in functions.php.
References
Configurations
History
21 Nov 2024, 00:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/36418 - | |
References | () http://osvdb.org/36419 - | |
References | () http://secunia.com/advisories/26434 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/3008 - | |
References | () http://www.securityfocus.com/archive/1/476261/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/477179/100/0/threaded - | |
References | () http://www.vupen.com/english/advisories/2007/2878 - Vendor Advisory |
Information
Published : 2007-08-14 18:17
Updated : 2024-11-21 00:35
NVD link : CVE-2007-4339
Mitre link : CVE-2007-4339
CVE.ORG link : CVE-2007-4339
JSON object : View
Products Affected
phpcentral
- poll_script
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')