contrib/mx_glance_sdesc.php in the mx_glance 2.3.3 module for mxBB places a critical security check within a comment because of a missing comment delimiter, which allows remote attackers to conduct remote file inclusion attacks and execute arbitrary PHP code via a URL in the mx_root_path parameter. NOTE: some sources incorrectly state that phpbb_root_path is the affected parameter.
References
Configurations
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/37400 - | |
References | () http://secunia.com/advisories/27011 - | |
References | () http://www.attrition.org/pipermail/vim/2007-October/001807.html - Exploit | |
References | () http://www.attrition.org/pipermail/vim/2007-October/001808.html - | |
References | () http://www.securityfocus.com/bid/25866 - | |
References | () http://www.vupen.com/english/advisories/2007/3326 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36867 - | |
References | () https://www.exploit-db.com/exploits/4470 - |
Information
Published : 2007-10-03 14:17
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5178
Mitre link : CVE-2007-5178
CVE.ORG link : CVE-2007-5178
JSON object : View
Products Affected
mxbb
- mx_glance
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')