Multiple PHP remote file inclusion vulnerabilities in Portail Web Php 2.5.1.1 allow remote attackers to execute arbitrary PHP code via a URL in the site_path parameter to (1) config/conf-activation.php, (2) menu/item.php, and (3) modules/conf_modules.php in admin/system/; and (4) system/login.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/27616 | Exploit |
http://www.securityfocus.com/bid/27616 | Exploit |
Configurations
History
21 Nov 2024, 00:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/27616 - Exploit |
Information
Published : 2008-02-07 21:00
Updated : 2024-11-21 00:42
NVD link : CVE-2008-0645
Mitre link : CVE-2008-0645
CVE.ORG link : CVE-2008-0645
JSON object : View
Products Affected
portail_web_php
- portail_web_php
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')