PHP remote file inclusion vulnerability in main.inc in KorWeblog 1.6.2-cvs and earlier allows remote attackers to execute arbitrary PHP code by modifying the G_PATH parameter to reference a URL on a remote web server that contains the code, as demonstrated in index.php when using .. (dot dot) sequences in the lng parameter to cause main.inc to be loaded.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=110442847614890&w=2 - | |
References | () http://secunia.com/advisories/13700 - | |
References | () http://www.securityfocus.com/bid/12132 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18717 - |
Information
Published : 2004-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-1427
Mitre link : CVE-2004-1427
CVE.ORG link : CVE-2004-1427
JSON object : View
Products Affected
korweblog
- korweblog
CWE