PHP remote file inclusion vulnerability in nucleus/plugins/NP_Twitter.php in the NP_Twitter Plugin 0.8 and 0.9 for Nucleus, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the DIR_PLUGINS parameter. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://packetstormsecurity.org/1005-exploits/nucleustwitter-rfi.txt | Exploit |
http://secunia.com/advisories/39997 | Vendor Advisory |
http://www.exploit-db.com/exploits/12790/ | Exploit |
http://www.osvdb.org/65007 | Exploit |
http://www.securityfocus.com/bid/40453 | Exploit |
http://www.vupen.com/english/advisories/2010/1284 | Vendor Advisory |
http://packetstormsecurity.org/1005-exploits/nucleustwitter-rfi.txt | Exploit |
http://secunia.com/advisories/39997 | Vendor Advisory |
http://www.exploit-db.com/exploits/12790/ | Exploit |
http://www.osvdb.org/65007 | Exploit |
http://www.securityfocus.com/bid/40453 | Exploit |
http://www.vupen.com/english/advisories/2010/1284 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/1005-exploits/nucleustwitter-rfi.txt - Exploit | |
References | () http://secunia.com/advisories/39997 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/12790/ - Exploit | |
References | () http://www.osvdb.org/65007 - Exploit | |
References | () http://www.securityfocus.com/bid/40453 - Exploit | |
References | () http://www.vupen.com/english/advisories/2010/1284 - Vendor Advisory |
Information
Published : 2010-06-17 16:30
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2314
Mitre link : CVE-2010-2314
CVE.ORG link : CVE-2010-2314
JSON object : View
Products Affected
nucleus_group
- nucleus_cms
edmondhui.homeip
- np_twitter
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')