Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2004-2044

Опубликовано: 01 июн. 2004
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:francisco_burzi:php-nuke:5.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.2a:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.4:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.5:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.6:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*
cpe:2.3:a:oscommerce:osc2nuke:7x_1.0:*:*:*:*:*:*:*
cpe:2.3:a:paul_laudanski:betanc_php-nuke:bundle:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*

EPSS

Процентиль: 77%
0.01076
Низкий

7.5 High

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

github
почти 4 года назад

PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string.

EPSS

Процентиль: 77%
0.01076
Низкий

7.5 High

CVSS2

Дефекты

NVD-CWE-Other