Vulnerability Description
Dynamic variable evaluation vulnerability in lists/admin.php in phpList 2.10.8 and earlier, when register_globals is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the _SERVER[ConfigFile] parameter to admin/index.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tincan | Phplist | <= 2.10.8 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/33533Vendor Advisory
- http://www.bugreport.ir/index_60.htmExploit
- http://www.securityfocus.com/archive/1/500057/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47945
- https://www.exploit-db.com/exploits/7778
- http://secunia.com/advisories/33533Vendor Advisory
- http://www.bugreport.ir/index_60.htmExploit
- http://www.securityfocus.com/archive/1/500057/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47945
- https://www.exploit-db.com/exploits/7778
FAQ
What is CVE-2009-0422?
CVE-2009-0422 is a vulnerability with a CVSS score of 7.5 (HIGH). Dynamic variable evaluation vulnerability in lists/admin.php in phpList 2.10.8 and earlier, when register_globals is disabled, allows remote attackers to include and execute arbitrary local files via ...
How severe is CVE-2009-0422?
CVE-2009-0422 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0422?
Check the references section above for vendor advisories and patch information. Affected products include: Tincan Phplist.