Vulnerability Description
php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpwebnotes | Phpwebnotes | 2.0.0 |
References
- http://marc.info/?l=bugtraq&m=112516693300371&w=2
- http://www.securityfocus.com/bid/14679Exploit
- http://www.securitytracker.com/alerts/2005/Aug/1014807.htmlExploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22040
- http://marc.info/?l=bugtraq&m=112516693300371&w=2
- http://www.securityfocus.com/bid/14679Exploit
- http://www.securitytracker.com/alerts/2005/Aug/1014807.htmlExploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22040
FAQ
What is CVE-2005-2775?
CVE-2005-2775 is a vulnerability with a CVSS score of 7.5 (HIGH). php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbit...
How severe is CVE-2005-2775?
CVE-2005-2775 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2775?
Check the references section above for vendor advisories and patch information. Affected products include: Phpwebnotes Phpwebnotes.