Описание
PHP remote file inclusion vulnerability in includes/session.php in Wheatblog (wB) 1.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the wb_class_dir parameter.
Ссылки
- Vendor Advisory
- Exploit
- Vendor Advisory
- Exploit
Уязвимые конфигурации
Конфигурация 1Версия до 1.1 (включая)
Одно из
cpe:2.3:a:wheatblog:wheatblog:*:*:*:*:*:*:*:*
cpe:2.3:a:wheatblog:wheatblog:1.0:*:*:*:*:*:*:*
EPSS
Процентиль: 95%
0.16568
Средний
5.1 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
PHP remote file inclusion vulnerability in includes/session.php in Wheatblog (wB) 1.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the wb_class_dir parameter.
EPSS
Процентиль: 95%
0.16568
Средний
5.1 Medium
CVSS2
Дефекты
NVD-CWE-Other