Описание
index.php in Fusion SBX 1.2 and earlier does not properly use the extract function, which allows remote attackers to bypass authentication by setting the is_logged parameter or execute arbitrary code via the maxname2 parameter.
Ссылки
- PatchVendor Advisory
- ExploitVendor AdvisoryURL Repurposed
- Vendor Advisory
- Vendor Advisory
- ExploitVendor Advisory
- PatchVendor Advisory
- ExploitVendor AdvisoryURL Repurposed
- Vendor Advisory
- Vendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.2 (включая)
cpe:2.3:a:fusion:sbx:*:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05244
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
index.php in Fusion SBX 1.2 and earlier does not properly use the extract function, which allows remote attackers to bypass authentication by setting the is_logged parameter or execute arbitrary code via the maxname2 parameter.
EPSS
Процентиль: 90%
0.05244
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other