ID CVE-2005-3519
Summary Multiple PHP file inclusion vulnerabilities in MySource 2.14.0 allow remote attackers to execute arbitrary PHP code and include arbitrary local files via the (1) INCLUDE_PATH and (2) SQUIZLIB_PATH parameters in new_upgrade_functions.php, (3) the INCLUDE_PATH parameter in init_mysource.php, and the PEAR_PATH parameter in (4) Socket.php, (5) Request.php, (6) Mail.php, (7) Date.php, (8) Span.php, (9) mimeDecode.php, and (10) mime.php.
References
Vulnerable Configurations
  • cpe:2.3:a:mysource:mysource:2.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:mysource:mysource:2.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mysource:mysource:2.14.0rc2:*:*:*:*:*:*:*
    cpe:2.3:a:mysource:mysource:2.14.0rc2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:33)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 15133
bugtraq 20051018 Secunia Research: MySource Cross-Site Scripting and File Inclusion
osvdb
  • 20035
  • 20036
  • 20037
  • 20038
  • 20039
  • 20040
  • 20041
  • 20042
  • 20043
sectrack 1015075
secunia 16946
sreason 92
vupen ADV-2005-2132
xf mysource-multiple-file-include(22772)
Last major update 11-07-2017 - 01:33
Published 06-11-2005 - 11:03
Last modified 11-07-2017 - 01:33
Back to Top