CVE-2005-0862

Multiple PHP remote file inclusion vulnerabilities in PHPOpenChat 3.0.1 and earlier allow remote attackers to execute arbitrary PHP code via the phpbb_root_path parameter to (1) poc_loginform.php or (2) phpbb/poc.php, the poc_root_path parameter to (3) phpbb/poc.php, (4) phpnuke/ENGLISH_poc.php, (5) phpnuke/poc.php, or (6) yabbse/poc.php, or (7) the sourcedir parameter to yabbse/poc.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpopenchat:phpopenchat:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:phpopenchat:phpopenchat:3.0.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:56

Type Values Removed Values Added
References () http://secunia.com/advisories/14600 - Vendor Advisory () http://secunia.com/advisories/14600 - Vendor Advisory
References () http://securitytracker.com/id?1013434 - Exploit () http://securitytracker.com/id?1013434 - Exploit
References () http://www.albanianhaxorz.org/advisory/phpopenchaten.txt - () http://www.albanianhaxorz.org/advisory/phpopenchaten.txt -
References () http://www.osvdb.org/14807 - () http://www.osvdb.org/14807 -
References () http://www.osvdb.org/14808 - () http://www.osvdb.org/14808 -
References () http://www.osvdb.org/14809 - () http://www.osvdb.org/14809 -
References () http://www.securityfocus.com/archive/1/465237/100/0/threaded - () http://www.securityfocus.com/archive/1/465237/100/0/threaded -
References () http://www.securityfocus.com/bid/12817 - () http://www.securityfocus.com/bid/12817 -
References () http://www.zone-h.org/advisories/read/id=7310 - Exploit, Vendor Advisory () http://www.zone-h.org/advisories/read/id=7310 - Exploit, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19721 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19721 -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:56


NVD link : CVE-2005-0862

Mitre link : CVE-2005-0862

CVE.ORG link : CVE-2005-0862


JSON object : View

Products Affected

phpopenchat

  • phpopenchat