Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in ooComments 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the PathToComment parameter for (1) classes/class_admin.php and (2) classes/class_comments.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oocomments | Oocomments | 1.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/28401Exploit
- http://www.securityfocus.com/bid/28401/exploitExploit
- http://www.securityfocus.com/bid/28401Exploit
- http://www.securityfocus.com/bid/28401/exploitExploit
FAQ
What is CVE-2008-1511?
CVE-2008-1511 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Multiple PHP remote file inclusion vulnerabilities in ooComments 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the PathToComment parameter for (1) classes/class_admin.php and (...
How severe is CVE-2008-1511?
CVE-2008-1511 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2008-1511?
Check the references section above for vendor advisories and patch information. Affected products include: Oocomments Oocomments.