Описание
highlight.php in (1) RUNCMS 1.1A, (2) CIAMOS 0.9.2 RC1, (3) e-Xoops 1.05 Rev3, and possibly other products based on e-Xoops (exoops), allows remote attackers to read arbitrary PHP files by specifying the pathname in the file parameter, as demonstrated by reading database configuration information from mainfile.php.
Ссылки
- PatchVendor Advisory
- Vendor Advisory
- ExploitURL Repurposed
- Vendor AdvisoryURL Repurposed
- Exploit
- PatchVendor Advisory
- Vendor Advisory
- ExploitURL Repurposed
- Vendor AdvisoryURL Repurposed
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ciamos:ciamos:0.9.2_rc1:*:*:*:*:*:*:*
cpe:2.3:a:e-xoops:e-xoops:1.05r3:*:*:*:*:*:*:*
cpe:2.3:a:runcms:runcms:1.1a:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05459
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
highlight.php in (1) RUNCMS 1.1A, (2) CIAMOS 0.9.2 RC1, (3) e-Xoops 1.05 Rev3, and possibly other products based on e-Xoops (exoops), allows remote attackers to read arbitrary PHP files by specifying the pathname in the file parameter, as demonstrated by reading database configuration information from mainfile.php.
EPSS
Процентиль: 90%
0.05459
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other