register.php in S8Forum 3.0 allows remote attackers to execute arbitrary PHP commands by creating a user whose name ends in a .php extension and entering the desired commands into the E-mail field, which creates a web-accessible .php file that can be called by the attacker, as demonstrated using a "system($cmd)" E-mail address with a "any_name.php" username.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0004.html | Exploit Vendor Advisory |
http://secunia.com/advisories/7819 | |
http://www.iss.net/security_center/static/10974.php | |
http://www.securityfocus.com/archive/1/305406 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/6547 | Exploit |
http://www.securitytracker.com/id?1005881 | |
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0004.html | Exploit Vendor Advisory |
http://secunia.com/advisories/7819 | |
http://www.iss.net/security_center/static/10974.php | |
http://www.securityfocus.com/archive/1/305406 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/6547 | Exploit |
http://www.securitytracker.com/id?1005881 |
Configurations
History
20 Nov 2024, 23:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0004.html - Exploit, Vendor Advisory | |
References | () http://secunia.com/advisories/7819 - | |
References | () http://www.iss.net/security_center/static/10974.php - | |
References | () http://www.securityfocus.com/archive/1/305406 - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/6547 - Exploit | |
References | () http://www.securitytracker.com/id?1005881 - |
Information
Published : 2003-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-1252
Mitre link : CVE-2003-1252
CVE.ORG link : CVE-2003-1252
JSON object : View
Products Affected
kelli_shaver
- s8forum
CWE