CVE-2009-4779

Multiple PHP remote file inclusion vulnerabilities in NukeHall 0.3 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter to (1) blocks.php, (2) messages.php, and (3) stories.php in admin/modules/.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:robert_garrigos:nukehall:*:*:*:*:*:*:*:*
cpe:2.3:a:robert_garrigos:nukehall:0.2:b:*:*:*:*:*:*
cpe:2.3:a:robert_garrigos:nukehall:0.2.1:b:*:*:*:*:*:*
cpe:2.3:a:robert_garrigos:nukehall:0.3:rc1:*:*:*:*:*:*

History

21 Nov 2024, 01:10

Type Values Removed Values Added
References () http://www.exploit-db.com/exploits/10217 - Exploit () http://www.exploit-db.com/exploits/10217 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54393 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/54393 -

Information

Published : 2010-04-21 14:30

Updated : 2024-11-21 01:10


NVD link : CVE-2009-4779

Mitre link : CVE-2009-4779

CVE.ORG link : CVE-2009-4779


JSON object : View

Products Affected

robert_garrigos

  • nukehall
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')