Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h59q-q46g-w2rm

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in addedit-render.php in phpAddEdit 1.3, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a URL in the editform parameter. NOTE: PHP remote file inclusion attacks are also likely.

Directory traversal vulnerability in addedit-render.php in phpAddEdit 1.3, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a URL in the editform parameter. NOTE: PHP remote file inclusion attacks are also likely.

EPSS

Процентиль: 84%
0.02324
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
почти 17 лет назад

Directory traversal vulnerability in addedit-render.php in phpAddEdit 1.3, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a URL in the editform parameter. NOTE: PHP remote file inclusion attacks are also likely.

EPSS

Процентиль: 84%
0.02324
Низкий

Дефекты

CWE-22