Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hm2m-jm9x-jxxm

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Dynamic variable evaluation vulnerability in index.php in Stadtaus Guestbook Script 1.7 and earlier, when register_globals is enabled, allows remote attackers to modify arbitrary program variables via parameters, which are evaluated as PHP variable variables, as demonstrated by performing PHP remote file inclusion using the include_files array parameter.

Dynamic variable evaluation vulnerability in index.php in Stadtaus Guestbook Script 1.7 and earlier, when register_globals is enabled, allows remote attackers to modify arbitrary program variables via parameters, which are evaluated as PHP variable variables, as demonstrated by performing PHP remote file inclusion using the include_files array parameter.

EPSS

Процентиль: 69%
0.00596
Низкий

Связанные уязвимости

nvd
почти 20 лет назад

Dynamic variable evaluation vulnerability in index.php in Stadtaus Guestbook Script 1.7 and earlier, when register_globals is enabled, allows remote attackers to modify arbitrary program variables via parameters, which are evaluated as PHP variable variables, as demonstrated by performing PHP remote file inclusion using the include_files array parameter.

EPSS

Процентиль: 69%
0.00596
Низкий