Описание
PHP remote file inclusion vulnerability in nucleus/plugins/NP_Twitter.php in the NP_Twitter Plugin 0.8 and 0.9 for Nucleus, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the DIR_PLUGINS parameter. NOTE: some of these details are obtained from third party information.
Ссылки
- Exploit
- Vendor Advisory
- Exploit
- Exploit
- Exploit
- Vendor Advisory
- Exploit
- Vendor Advisory
- Exploit
- Exploit
- Exploit
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:a:edmondhui.homeip:np_twitter:0.8:*:*:*:*:*:*:*
cpe:2.3:a:edmondhui.homeip:np_twitter:0.9:*:*:*:*:*:*:*
cpe:2.3:a:nucleus_group:nucleus_cms:*:*:*:*:*:*:*:*
EPSS
Процентиль: 83%
0.01983
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-94
Связанные уязвимости
github
больше 3 лет назад
PHP remote file inclusion vulnerability in nucleus/plugins/NP_Twitter.php in the NP_Twitter Plugin 0.8 and 0.9 for Nucleus, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the DIR_PLUGINS parameter. NOTE: some of these details are obtained from third party information.
EPSS
Процентиль: 83%
0.01983
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-94