Описание
PHP remote file inclusion vulnerability in PHPWebLog 0.5.3 and earlier allows remote attackers to execute arbitrary PHP code by modifying the (1) G_PATH parameter to init.inc.php or the (2) PATH parameter to index.php to reference a URL on a remote web server that contains the code.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:jason_hines:phpweblog:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:jason_hines:phpweblog:0.5:*:*:*:*:*:*:*
cpe:2.3:a:jason_hines:phpweblog:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:jason_hines:phpweblog:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:jason_hines:phpweblog:0.5.3:*:*:*:*:*:*:*
EPSS
Процентиль: 69%
0.00612
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
PHP remote file inclusion vulnerability in PHPWebLog 0.5.3 and earlier allows remote attackers to execute arbitrary PHP code by modifying the (1) G_PATH parameter to init.inc.php or the (2) PATH parameter to index.php to reference a URL on a remote web server that contains the code.
EPSS
Процентиль: 69%
0.00612
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other