Multiple PHP remote file inclusion vulnerabilities in Puzzle Apps CMS 2.2.1 allow remote attackers to execute arbitrary PHP code via a URL in the MODULEDIR parameter to (1) core/modules/my/my.module.php or (2) core/modules/xml/xml.module.php; the COREROOT parameter to (3) config.loader.php, (4) platform.loader.php, (5) core.loader.php, (6) person.loader.php, or (7) module.loader.php in core/ or (8) install/steps/step_3.php; or the THISDIR parameter to (9) people.lib.php, (10) general.lib.php, (11) content.lib.php, or (12) templates.lib.php in core/modules/admin/libs/ or (13) core/modules/webstat/MEC/index.php.
References
Configurations
History
No history.
Information
Published : 2007-10-01 05:17
Updated : 2024-02-04 17:13
NVD link : CVE-2007-5147
Mitre link : CVE-2007-5147
CVE.ORG link : CVE-2007-5147
JSON object : View
Products Affected
puzzle_apps_cms
- puzzle_apps_cms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')