CVE-2004-1427

PHP remote file inclusion vulnerability in main.inc in KorWeblog 1.6.2-cvs and earlier allows remote attackers to execute arbitrary PHP code by modifying the G_PATH parameter to reference a URL on a remote web server that contains the code, as demonstrated in index.php when using .. (dot dot) sequences in the lng parameter to cause main.inc to be loaded.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:korweblog:korweblog:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:korweblog:korweblog:1.6.2cvs:*:*:*:*:*:*:*

History

20 Nov 2024, 23:50

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=110442847614890&w=2 - () http://marc.info/?l=bugtraq&m=110442847614890&w=2 -
References () http://secunia.com/advisories/13700 - () http://secunia.com/advisories/13700 -
References () http://www.securityfocus.com/bid/12132 - Exploit () http://www.securityfocus.com/bid/12132 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18717 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18717 -

Information

Published : 2004-12-31 05:00

Updated : 2025-04-03 01:03


NVD link : CVE-2004-1427

Mitre link : CVE-2004-1427

CVE.ORG link : CVE-2004-1427


JSON object : View

Products Affected

korweblog

  • korweblog