Описание
register.php in S8Forum 3.0 allows remote attackers to execute arbitrary PHP commands by creating a user whose name ends in a .php extension and entering the desired commands into the E-mail field, which creates a web-accessible .php file that can be called by the attacker, as demonstrated using a "system($cmd)" E-mail address with a "any_name.php" username.
register.php in S8Forum 3.0 allows remote attackers to execute arbitrary PHP commands by creating a user whose name ends in a .php extension and entering the desired commands into the E-mail field, which creates a web-accessible .php file that can be called by the attacker, as demonstrated using a "system($cmd)" E-mail address with a "any_name.php" username.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2003-1252
- http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0004.html
- http://secunia.com/advisories/7819
- http://www.iss.net/security_center/static/10974.php
- http://www.securityfocus.com/archive/1/305406
- http://www.securityfocus.com/bid/6547
- http://www.securitytracker.com/id?1005881
EPSS
CVE ID
Связанные уязвимости
register.php in S8Forum 3.0 allows remote attackers to execute arbitrary PHP commands by creating a user whose name ends in a .php extension and entering the desired commands into the E-mail field, which creates a web-accessible .php file that can be called by the attacker, as demonstrated using a "system($cmd)" E-mail address with a "any_name.php" username.
EPSS