Multiple PHP file inclusion vulnerabilities in MySource 2.14.0 allow remote attackers to execute arbitrary PHP code and include arbitrary local files via the (1) INCLUDE_PATH and (2) SQUIZLIB_PATH parameters in new_upgrade_functions.php, (3) the INCLUDE_PATH parameter in init_mysource.php, and the PEAR_PATH parameter in (4) Socket.php, (5) Request.php, (6) Mail.php, (7) Date.php, (8) Span.php, (9) mimeDecode.php, and (10) mime.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=112966933202769&w=2 - | |
References | () http://secunia.com/advisories/16946/ - Exploit, Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/92 - | |
References | () http://securitytracker.com/id?1015075 - Exploit, Patch, Vendor Advisory | |
References | () http://www.osvdb.org/20035 - | |
References | () http://www.osvdb.org/20036 - | |
References | () http://www.osvdb.org/20037 - | |
References | () http://www.osvdb.org/20038 - | |
References | () http://www.osvdb.org/20039 - | |
References | () http://www.osvdb.org/20040 - | |
References | () http://www.osvdb.org/20041 - | |
References | () http://www.osvdb.org/20042 - | |
References | () http://www.osvdb.org/20043 - | |
References | () http://www.securityfocus.com/bid/15133/discuss - Exploit, Patch | |
References | () http://www.vupen.com/english/advisories/2005/2132 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/22772 - |
Information
Published : 2005-11-06 11:03
Updated : 2025-04-03 01:03
NVD link : CVE-2005-3519
Mitre link : CVE-2005-3519
CVE.ORG link : CVE-2005-3519
JSON object : View
Products Affected
mysource
- mysource
CWE