Multiple PHP remote file inclusion vulnerabilities Harris Yusuf Arifin Harris Wap Chat 1.0, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the sysFileDir parameter to (1) eng.writeMsg.php, (2) eng.adCreate.php, (3) eng.adCreateSave.php, (4) eng.adDispByTypeOptions.php, (5) eng.createRoom.php, (6) eng.forward.php, (7) eng.pageLogout.php, (8) eng.resultMember.php, (9) eng.roomDeleteConfirm.php, (10) eng.saveNewRoom.php, and (11) eng.searchMember.php in src/.
References
Configurations
History
21 Nov 2024, 00:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/30022 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/28995 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42112 - | |
References | () https://www.exploit-db.com/exploits/5525 - |
Information
Published : 2008-05-05 16:20
Updated : 2024-11-21 00:46
NVD link : CVE-2008-2074
Mitre link : CVE-2008-2074
CVE.ORG link : CVE-2008-2074
JSON object : View
Products Affected
successkid
- harris_wap_chat
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')