ID CVE-2005-2775
Summary php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
References
Vulnerable Configurations
  • cpe:2.3:a:phpwebnotes:phpwebnotes:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:phpwebnotes:phpwebnotes:2.0.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 14679
bugtraq 20050827 XSS security hole in phpwebnotes.
sectrack 1014807
xf phpwebnotes-phpapi-file-include(22040)
Last major update 11-07-2017 - 01:32
Published 02-09-2005 - 23:03
Last modified 11-07-2017 - 01:32
Back to Top