Vulnerability Description
SaveWebPortal 3.4 allows remote attackers to execute arbitrary PHP code via a direct request to admin/PhpMyExplorer/editerfichier.php, then editing the desired file to contain the PHP code, as demonstrated using header.php in the fichier parameter. NOTE: it is possible that this vulnerability stems from PhpMyExplorer, which is a separate package.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Savewebportal | Savewebportal | 3.4 |
References
- http://rgod.altervista.org/save_yourself_from_savewebportal34.htmlExploitVendor Advisory
- http://secunia.com/advisories/16522ExploitVendor Advisory
- http://rgod.altervista.org/save_yourself_from_savewebportal34.htmlExploitVendor Advisory
- http://secunia.com/advisories/16522ExploitVendor Advisory
FAQ
What is CVE-2005-2685?
CVE-2005-2685 is a vulnerability with a CVSS score of 7.5 (HIGH). SaveWebPortal 3.4 allows remote attackers to execute arbitrary PHP code via a direct request to admin/PhpMyExplorer/editerfichier.php, then editing the desired file to contain the PHP code, as demonst...
How severe is CVE-2005-2685?
CVE-2005-2685 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2685?
Check the references section above for vendor advisories and patch information. Affected products include: Savewebportal Savewebportal.