php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
References
Configurations
History
21 Nov 2024, 00:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=112516693300371&w=2 - | |
References | () http://www.securityfocus.com/bid/14679 - Exploit | |
References | () http://www.securitytracker.com/alerts/2005/Aug/1014807.html - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/22040 - |
Information
Published : 2005-09-02 23:03
Updated : 2024-11-21 00:00
NVD link : CVE-2005-2775
Mitre link : CVE-2005-2775
CVE.ORG link : CVE-2005-2775
JSON object : View
Products Affected
phpwebnotes
- phpwebnotes
CWE