Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2jcg-ch57-hfxf

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "register_globals" variables are set to "on", allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_dir parameter to reference a URL on a remote web server that contains the code.

install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "register_globals" variables are set to "on", allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_dir parameter to reference a URL on a remote web server that contains the code.

EPSS

Процентиль: 56%
0.00335
Низкий

Связанные уязвимости

nvd
почти 23 года назад

install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "register_globals" variables are set to "on", allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_dir parameter to reference a URL on a remote web server that contains the code.

debian
почти 23 года назад

install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "re ...

EPSS

Процентиль: 56%
0.00335
Низкий