Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2j7c-c562-m564

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Direct static code injection vulnerability in the flood protection feature in inc/shows.inc.php in CuteNews 1.4.0 and earlier allows remote attackers to execute arbitrary PHP code via the HTTP_CLIENT_IP header (Client-Ip), which is injected into data/flood.db.php.

Direct static code injection vulnerability in the flood protection feature in inc/shows.inc.php in CuteNews 1.4.0 and earlier allows remote attackers to execute arbitrary PHP code via the HTTP_CLIENT_IP header (Client-Ip), which is injected into data/flood.db.php.

EPSS

Процентиль: 85%
0.02429
Низкий

Связанные уязвимости

nvd
больше 20 лет назад

Direct static code injection vulnerability in the flood protection feature in inc/shows.inc.php in CuteNews 1.4.0 and earlier allows remote attackers to execute arbitrary PHP code via the HTTP_CLIENT_IP header (Client-Ip), which is injected into data/flood.db.php.

EPSS

Процентиль: 85%
0.02429
Низкий