Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pv5w-phrp-vmpf

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.

php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.

EPSS

Процентиль: 84%
0.02256
Низкий

Связанные уязвимости

nvd
больше 20 лет назад

php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.

EPSS

Процентиль: 84%
0.02256
Низкий