Описание
Direct static code injection vulnerability in error.php in GuppY 4.5.9 and earlier, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via the _SERVER[REMOTE_ADDR] parameter, which is injected into a .inc script that is later included by the main script.
Ссылки
- ExploitVendor Advisory
- Vendor Advisory
- Exploit
- Exploit
- ExploitVendor Advisory
- Vendor Advisory
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:guppy:guppy:4.5:*:*:*:*:*:*:*
cpe:2.3:a:guppy:guppy:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:guppy:guppy:4.5.3a:*:*:*:*:*:*:*
cpe:2.3:a:guppy:guppy:4.5.4:*:*:*:*:*:*:*
cpe:2.3:a:guppy:guppy:4.5.9:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05605
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Direct static code injection vulnerability in error.php in GuppY 4.5.9 and earlier, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via the _SERVER[REMOTE_ADDR] parameter, which is injected into a .inc script that is later included by the main script.
EPSS
Процентиль: 90%
0.05605
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other