PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16298 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16294 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16297 | vdb entry |
http://www.osvdb.org/6593 | vdb entry vendor advisory |
http://marc.info/?l=bugtraq&m=108662955105757&w=2 | mailing list |
http://www.securityfocus.com/bid/10447 | exploit vdb entry vendor advisory |
http://marc.info/?l=bugtraq&m=108611606320559&w=2 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16296 | vdb entry |
http://secunia.com/advisories/11766 | third party advisory vendor advisory |
http://marc.info/?l=bugtraq&m=108611643614881&w=2 | mailing list |