Описание
PHP remote file inclusion vulnerability in libraries/database.php in Efront 3.5.4 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the path parameter. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's security documentation.
Ссылки
- ExploitPatch
- ExploitPatch
Уязвимые конфигурации
Конфигурация 1Версия до 3.5.4 (включая)
Одно из
cpe:2.3:a:efrontlearning:efront:*:*:*:*:*:*:*:*
cpe:2.3:a:efrontlearning:efront:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:efrontlearning:efront:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:efrontlearning:efront:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:efrontlearning:efront:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:efrontlearning:efront:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:efrontlearning:efront:3.5.0:beta1:*:*:*:*:*:*
cpe:2.3:a:efrontlearning:efront:3.5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:efrontlearning:efront:3.5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:efrontlearning:efront:3.5.0:beta4:*:*:*:*:*:*
cpe:2.3:a:efrontlearning:efront:3.5.1:*:*:*:*:*:*:*
EPSS
Процентиль: 83%
0.02016
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-94
Связанные уязвимости
github
почти 4 года назад
PHP remote file inclusion vulnerability in libraries/database.php in Efront 3.5.4 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the path parameter. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's security documentation.
EPSS
Процентиль: 83%
0.02016
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-94