Multiple PHP remote file inclusion vulnerabilities in Puzzle Apps CMS 2.2.1 allow remote attackers to execute arbitrary PHP code via a URL in the MODULEDIR parameter to (1) core/modules/my/my.module.php or (2) core/modules/xml/xml.module.php; the COREROOT parameter to (3) config.loader.php, (4) platform.loader.php, (5) core.loader.php, (6) person.loader.php, or (7) module.loader.php in core/ or (8) install/steps/step_3.php; or the THISDIR parameter to (9) people.lib.php, (10) general.lib.php, (11) content.lib.php, or (12) templates.lib.php in core/modules/admin/libs/ or (13) core/modules/webstat/MEC/index.php.
References
Configurations
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://arfis.wordpress.com/2007/09/14/rfi-02-puzzle-apps-cms/ - |
Information
Published : 2007-10-01 05:17
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5147
Mitre link : CVE-2007-5147
CVE.ORG link : CVE-2007-5147
JSON object : View
Products Affected
puzzle_apps_cms
- puzzle_apps_cms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')