Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ggp6-wv6c-cpvx

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

artmedic newsletter 4.1 and possibly other versions, when register_globals is enabled, allows remote attackers to modify arbitrary files and execute arbitrary PHP code via the logfile parameter in a direct request to log.php, which causes the $logfile variable to be redefined to an attacker-controlled value, as demonstrated by injecting PHP code into info.php.

artmedic newsletter 4.1 and possibly other versions, when register_globals is enabled, allows remote attackers to modify arbitrary files and execute arbitrary PHP code via the logfile parameter in a direct request to log.php, which causes the $logfile variable to be redefined to an attacker-controlled value, as demonstrated by injecting PHP code into info.php.

EPSS

Процентиль: 89%
0.04655
Низкий

Связанные уязвимости

nvd
больше 19 лет назад

artmedic newsletter 4.1 and possibly other versions, when register_globals is enabled, allows remote attackers to modify arbitrary files and execute arbitrary PHP code via the logfile parameter in a direct request to log.php, which causes the $logfile variable to be redefined to an attacker-controlled value, as demonstrated by injecting PHP code into info.php.

EPSS

Процентиль: 89%
0.04655
Низкий