CVE-2005-2685

SaveWebPortal 3.4 allows remote attackers to execute arbitrary PHP code via a direct request to admin/PhpMyExplorer/editerfichier.php, then editing the desired file to contain the PHP code, as demonstrated using header.php in the fichier parameter. NOTE: it is possible that this vulnerability stems from PhpMyExplorer, which is a separate package.
Configurations

Configuration 1 (hide)

cpe:2.3:a:savewebportal:savewebportal:3.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://rgod.altervista.org/save_yourself_from_savewebportal34.html - Exploit, Vendor Advisory () http://rgod.altervista.org/save_yourself_from_savewebportal34.html - Exploit, Vendor Advisory
References () http://secunia.com/advisories/16522 - Exploit, Vendor Advisory () http://secunia.com/advisories/16522 - Exploit, Vendor Advisory

Information

Published : 2005-08-24 04:00

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2685

Mitre link : CVE-2005-2685

CVE.ORG link : CVE-2005-2685


JSON object : View

Products Affected

savewebportal

  • savewebportal