var-200406-0051
Vulnerability from variot
PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string. PHP-Nuke is affected by a direct script access security vulnerability. This issue is due to a failure to properly validate the location and name of the file being accessed. This issue will allow an attacker to gain access to sensitive scripts such as the 'admin.php' script. The attacker may be able to exploit this unauthorized access to carry out attacks against the affected application. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200406-0051", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.2" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.6" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.4" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "6.5" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.3.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.2a" }, { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "5.5" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.5_final" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "5.0.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.5_beta1" }, { "model": "secure linux", "scope": "eq", "trust": 1.0, "vendor": "trustix", "version": "2.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.2" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.7" }, { "model": "secure linux", "scope": "eq", "trust": 1.0, "vendor": "trustix", "version": "2.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.5_rc2" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.3" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.5_rc1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.9" }, { "model": "osc2nuke", "scope": "eq", "trust": 1.0, "vendor": "oscommerce", "version": "7x_1.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.0_final" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.5_rc3" }, { "model": "betanc php-nuke", "scope": "eq", "trust": 1.0, "vendor": "paul laudanski", "version": "bundle" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.6" }, { "model": "laudanski betanc php-nuke bundle", "scope": null, "trust": 0.3, "vendor": "paul", "version": null }, { "model": "osc2nuke", "scope": "eq", "trust": 0.3, "vendor": "oscommerce", "version": "7x1.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.3" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.2" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.1" }, { "model": "burzi php-nuke final", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.9" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.7" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.6" }, { "model": "burzi php-nuke rc3", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke rc2", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke rc1", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke final", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke beta", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.51" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.6" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.5" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.4" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.3.1" }, { "model": "burzi php-nuke a", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.2" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.2" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.1" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.0.1" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "5.0" } ], "sources": [ { "db": "BID", "id": "10447" }, { "db": "CNNVD", "id": "CNNVD-200406-037" }, { "db": "NVD", "id": "CVE-2004-2044" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Squid squidsecurity@hushmail.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200406-037" } ], "trust": 0.6 }, "cve": "CVE-2004-2044", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2004-2044", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-10472", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-2044", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200406-037", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-10472", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-10472" }, { "db": "CNNVD", "id": "CNNVD-200406-037" }, { "db": "NVD", "id": "CVE-2004-2044" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER[\u0027PHP_SELF\u0027] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the \"admin.php\" string. PHP-Nuke is affected by a direct script access security vulnerability. This issue is due to a failure to properly validate the location and name of the file being accessed. \nThis issue will allow an attacker to gain access to sensitive scripts such as the \u0027admin.php\u0027 script. The attacker may be able to exploit this unauthorized access to carry out attacks against the affected application. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc", "sources": [ { "db": "NVD", "id": "CVE-2004-2044" }, { "db": "BID", "id": "10447" }, { "db": "VULHUB", "id": "VHN-10472" } ], "trust": 1.26 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-10472", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10472" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "10447", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2004-2044", "trust": 1.7 }, { "db": "OSVDB", "id": "6593", "trust": 1.7 }, { "db": "SECUNIA", "id": "11766", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200406-037", "trust": 0.7 }, { "db": "XF", "id": "2", "trust": 0.6 }, { "db": "XF", "id": "16294", "trust": 0.6 }, { "db": "XF", "id": "16298", "trust": 0.6 }, { "db": "XF", "id": "16297", "trust": 0.6 }, { "db": "XF", "id": "16296", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040601 [SQUID 2004-OSC2NUKE-001] INADEQUATE SECURITY CHECKING IN OSC2NUKE", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040601 [SQUID 2004-BETANC-001] INADEQUATE SECURITY CHECKING IN NUKECOPS BETANC BUNDLE", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040601 [SQUID 2004-BETANC-001] INADEQUATE SECURITY CHECKING IN NUKECOPS", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040601 [SQUID 2004-NUKE-001] INADEQUATE SECURITY CHECKING IN PHPNUKE", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040606 RE: [SQUID 2004-NUKE-001] INADEQUATE SECURITY CHECKING IN PHPNUKE", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-77899", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "24166", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-10472", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-10472" }, { "db": "BID", "id": "10447" }, { "db": "CNNVD", "id": "CNNVD-200406-037" }, { "db": "NVD", "id": "CVE-2004-2044" } ] }, "id": "VAR-200406-0051", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-10472" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:14:26.933000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-2044" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/10447" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html" }, { "trust": 1.7, "url": "http://www.osvdb.org/6593" }, { "trust": 1.7, "url": "http://secunia.com/advisories/11766" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16298" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16296" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16297" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16294" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108611606320559\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108611643614881\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108662955105757\u0026w=2" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16298" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16297" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16296" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16294" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108662955105757\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108611643614881\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108611606320559\u0026w=2" }, { "trust": 0.3, "url": "http://www.oscommerce.com" }, { "trust": 0.3, "url": "http://www.irannuke.com/" }, { "trust": 0.3, "url": "/archive/1/364840" }, { "trust": 0.3, "url": "/archive/1/364842" }, { "trust": 0.3, "url": "/archive/1/364847" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108611643614881\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108611606320559\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108662955105757\u0026amp;w=2" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10472" }, { "db": "BID", "id": "10447" }, { "db": "CNNVD", "id": "CNNVD-200406-037" }, { "db": "NVD", "id": "CVE-2004-2044" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-10472" }, { "db": "BID", "id": "10447" }, { "db": "CNNVD", "id": "CNNVD-200406-037" }, { "db": "NVD", "id": "CVE-2004-2044" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-06-01T00:00:00", "db": "VULHUB", "id": "VHN-10472" }, { "date": "2004-06-01T00:00:00", "db": "BID", "id": "10447" }, { "date": "2004-06-01T00:00:00", "db": "CNNVD", "id": "CNNVD-200406-037" }, { "date": "2004-06-01T04:00:00", "db": "NVD", "id": "CVE-2004-2044" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-10472" }, { "date": "2004-06-01T00:00:00", "db": "BID", "id": "10447" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200406-037" }, { "date": "2024-11-20T23:52:21.970000", "db": "NVD", "id": "CVE-2004-2044" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200406-037" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP-Nuke Direct Script Access Security Bypass Vulnerability", "sources": [ { "db": "BID", "id": "10447" }, { "db": "CNNVD", "id": "CNNVD-200406-037" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access verification error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200406-037" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.