Vulnerability Description
PHP remote file inclusion vulnerability in Actionpoll PHP script before 1.1.2 allows remote attackers to execute arbitrary PHP code via a URL in the includedir parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Actionpoll | Actionpoll | <= 1.1.1 |
References
- http://archives.neohapsis.com/archives/bugtraq/2001-10/0012.html
- http://sourceforge.net/project/shownotes.php?release_id=58331
- http://www.iss.net/security_center/static/7215.phpPatchVendor Advisory
- http://www.osvdb.org/1960
- http://www.securityfocus.com/bid/3384ExploitVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2001-10/0012.html
- http://sourceforge.net/project/shownotes.php?release_id=58331
- http://www.iss.net/security_center/static/7215.phpPatchVendor Advisory
- http://www.osvdb.org/1960
- http://www.securityfocus.com/bid/3384ExploitVendor Advisory
FAQ
What is CVE-2001-1297?
CVE-2001-1297 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in Actionpoll PHP script before 1.1.2 allows remote attackers to execute arbitrary PHP code via a URL in the includedir parameter.
How severe is CVE-2001-1297?
CVE-2001-1297 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1297?
Check the references section above for vendor advisories and patch information. Affected products include: Actionpoll Actionpoll.