Описание
install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "register_globals" variables are set to "on", allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_dir parameter to reference a URL on a remote web server that contains the code.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:phpbb_group:phpbb:2.0_rc1:*:*:*:*:*:*:*
cpe:2.3:a:phpbb_group:phpbb:2.0_rc2:*:*:*:*:*:*:*
cpe:2.3:a:phpbb_group:phpbb:2.0_rc3:*:*:*:*:*:*:*
cpe:2.3:a:phpbb_group:phpbb:2.0_rc4:*:*:*:*:*:*:*
EPSS
Процентиль: 56%
0.00335
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
почти 23 года назад
install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "re ...
github
больше 3 лет назад
install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "register_globals" variables are set to "on", allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_dir parameter to reference a URL on a remote web server that contains the code.
EPSS
Процентиль: 56%
0.00335
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other