CVE-2008-2074

Multiple PHP remote file inclusion vulnerabilities Harris Yusuf Arifin Harris Wap Chat 1.0, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the sysFileDir parameter to (1) eng.writeMsg.php, (2) eng.adCreate.php, (3) eng.adCreateSave.php, (4) eng.adDispByTypeOptions.php, (5) eng.createRoom.php, (6) eng.forward.php, (7) eng.pageLogout.php, (8) eng.resultMember.php, (9) eng.roomDeleteConfirm.php, (10) eng.saveNewRoom.php, and (11) eng.searchMember.php in src/.
Configurations

Configuration 1 (hide)

cpe:2.3:a:successkid:harris_wap_chat:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:46

Type Values Removed Values Added
References () http://secunia.com/advisories/30022 - Vendor Advisory () http://secunia.com/advisories/30022 - Vendor Advisory
References () http://www.securityfocus.com/bid/28995 - Exploit () http://www.securityfocus.com/bid/28995 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42112 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/42112 -
References () https://www.exploit-db.com/exploits/5525 - () https://www.exploit-db.com/exploits/5525 -

Information

Published : 2008-05-05 16:20

Updated : 2024-11-21 00:46


NVD link : CVE-2008-2074

Mitre link : CVE-2008-2074

CVE.ORG link : CVE-2008-2074


JSON object : View

Products Affected

successkid

  • harris_wap_chat
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')