Описание
PHP remote file inclusion vulnerability in start_lobby.php in MWChat 6.x allows remote attackers to execute arbitrary PHP code via the CONFIG[MWCHAT_Libs] parameter.
Ссылки
- PatchVendor Advisory
- ExploitVendor AdvisoryURL Repurposed
- Vendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- ExploitVendor AdvisoryURL Repurposed
- Vendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.7 (включая)
cpe:2.3:a:appindex:mwchat:*:*:*:*:*:*:*:*
EPSS
Процентиль: 78%
0.01093
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
PHP remote file inclusion vulnerability in start_lobby.php in MWChat 6.x allows remote attackers to execute arbitrary PHP code via the CONFIG[MWCHAT_Libs] parameter.
EPSS
Процентиль: 78%
0.01093
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other