CVE-2005-2775

php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpwebnotes:phpwebnotes:2.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=112516693300371&w=2 - () http://marc.info/?l=bugtraq&m=112516693300371&w=2 -
References () http://www.securityfocus.com/bid/14679 - Exploit () http://www.securityfocus.com/bid/14679 - Exploit
References () http://www.securitytracker.com/alerts/2005/Aug/1014807.html - Exploit () http://www.securitytracker.com/alerts/2005/Aug/1014807.html - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22040 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22040 -

Information

Published : 2005-09-02 23:03

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2775

Mitre link : CVE-2005-2775

CVE.ORG link : CVE-2005-2775


JSON object : View

Products Affected

phpwebnotes

  • phpwebnotes