CVE-2004-2044

PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:francisco_burzi:php-nuke:5.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.2a:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.4:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.5:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:5.6:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*
cpe:2.3:a:oscommerce:osc2nuke:7x_1.0:*:*:*:*:*:*:*
cpe:2.3:a:paul_laudanski:betanc_php-nuke:bundle:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:52

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html - () http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html -
References () http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html - () http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html -
References () http://marc.info/?l=bugtraq&m=108611606320559&w=2 - () http://marc.info/?l=bugtraq&m=108611606320559&w=2 -
References () http://marc.info/?l=bugtraq&m=108611643614881&w=2 - () http://marc.info/?l=bugtraq&m=108611643614881&w=2 -
References () http://marc.info/?l=bugtraq&m=108662955105757&w=2 - () http://marc.info/?l=bugtraq&m=108662955105757&w=2 -
References () http://secunia.com/advisories/11766 - Vendor Advisory () http://secunia.com/advisories/11766 - Vendor Advisory
References () http://www.osvdb.org/6593 - Vendor Advisory () http://www.osvdb.org/6593 - Vendor Advisory
References () http://www.securityfocus.com/bid/10447 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/10447 - Exploit, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16294 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16294 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16296 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16296 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16297 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16297 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16298 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16298 -

Information

Published : 2004-06-01 04:00

Updated : 2024-11-20 23:52


NVD link : CVE-2004-2044

Mitre link : CVE-2004-2044

CVE.ORG link : CVE-2004-2044


JSON object : View

Products Affected

paul_laudanski

  • betanc_php-nuke

trustix

  • secure_linux

oscommerce

  • osc2nuke

francisco_burzi

  • php-nuke