Vulnerability Description
wap/index.php in Crossday Discuz! Board 6.x and 7.x allows remote authenticated users to execute arbitrary PHP code via the creditsformula parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Comsenz | Crossday Discuz\! Board | 6.0.1 |
Related Weaknesses (CWE)
References
- http://osvdb.org/50202
- http://secunia.com/advisories/32731Vendor Advisory
- http://www.80vul.com/dzvul/sodb/13/dz-exp-sodb-2008-13_php.htmExploit
- http://www.discuz.net/archiver/?tid-1112426.htmlExploit
- http://www.securityfocus.com/bid/32303Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46644
- https://www.exploit-db.com/exploits/7119
- http://osvdb.org/50202
- http://secunia.com/advisories/32731Vendor Advisory
- http://www.80vul.com/dzvul/sodb/13/dz-exp-sodb-2008-13_php.htmExploit
- http://www.discuz.net/archiver/?tid-1112426.htmlExploit
- http://www.securityfocus.com/bid/32303Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46644
- https://www.exploit-db.com/exploits/7119
FAQ
What is CVE-2008-6958?
CVE-2008-6958 is a vulnerability with a CVSS score of 6.5 (MEDIUM). wap/index.php in Crossday Discuz! Board 6.x and 7.x allows remote authenticated users to execute arbitrary PHP code via the creditsformula parameter.
How severe is CVE-2008-6958?
CVE-2008-6958 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-6958?
Check the references section above for vendor advisories and patch information. Affected products include: Comsenz Crossday Discuz\! Board.