Описание
PHP remote file inclusion vulnerability in lib/OWL_API.php in OWL Intranet Engine 0.82, when register_globals is enabled, allows remote attackers to include arbitrary files via a URL in the xrms_file_root parameter, which is not initialized before use.
Ссылки
- ExploitVendor Advisory
- Exploit
- ExploitVendor Advisory
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:owl:owl_intranet_engine:0.6:*:*:*:*:*:*:*
cpe:2.3:a:owl:owl_intranet_engine:0.8:*:*:*:*:*:*:*
cpe:2.3:a:owl:owl_intranet_engine:0.72:*:*:*:*:*:*:*
cpe:2.3:a:owl:owl_intranet_engine:0.73:*:*:*:*:*:*:*
cpe:2.3:a:owl:owl_intranet_engine:0.82:*:*:*:*:*:*:*
EPSS
Процентиль: 95%
0.16012
Средний
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
PHP remote file inclusion vulnerability in lib/OWL_API.php in OWL Intranet Engine 0.82, when register_globals is enabled, allows remote attackers to include arbitrary files via a URL in the xrms_file_root parameter, which is not initialized before use.
EPSS
Процентиль: 95%
0.16012
Средний
7.5 High
CVSS2
Дефекты
NVD-CWE-Other