Описание
PHP remote file inclusion vulnerability in zipndownload.php in PhotoPost 4.0 through 4.6 allows remote attackers to execute arbitrary PHP code via a URL in the PP_PATH parameter.
Ссылки
- ExploitPatch
- ExploitPatch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:photopost:photopost_php_pro:4.0:*:*:*:*:*:*:*
cpe:2.3:a:photopost:photopost_php_pro:4.1:*:*:*:*:*:*:*
cpe:2.3:a:photopost:photopost_php_pro:4.2:*:*:*:*:*:*:*
cpe:2.3:a:photopost:photopost_php_pro:4.3:*:*:*:*:*:*:*
cpe:2.3:a:photopost:photopost_php_pro:4.4:*:*:*:*:*:*:*
cpe:2.3:a:photopost:photopost_php_pro:4.5:*:*:*:*:*:*:*
cpe:2.3:a:photopost:photopost_php_pro:4.6:*:*:*:*:*:*:*
EPSS
Процентиль: 88%
0.04079
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
PHP remote file inclusion vulnerability in zipndownload.php in PhotoPost 4.0 through 4.6 allows remote attackers to execute arbitrary PHP code via a URL in the PP_PATH parameter.
EPSS
Процентиль: 88%
0.04079
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other