Vulnerability Description
Static code injection vulnerability in post.php in Simple PHP News 1.0 final allows remote attackers to inject arbitrary PHP code into news.txt via the post parameter, and then execute the code via a direct request to display.php. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dminnich | Simple Php News | 1.0 |
Related Weaknesses (CWE)
References
- http://osvdb.org/51816
- http://secunia.com/advisories/33814Vendor Advisory
- http://www.vupen.com/english/advisories/2009/0357
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48829
- https://www.exploit-db.com/exploits/7999
- http://osvdb.org/51816
- http://secunia.com/advisories/33814Vendor Advisory
- http://www.vupen.com/english/advisories/2009/0357
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48829
- https://www.exploit-db.com/exploits/7999
FAQ
What is CVE-2009-0643?
CVE-2009-0643 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Static code injection vulnerability in post.php in Simple PHP News 1.0 final allows remote attackers to inject arbitrary PHP code into news.txt via the post parameter, and then execute the code via a ...
How severe is CVE-2009-0643?
CVE-2009-0643 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0643?
Check the references section above for vendor advisories and patch information. Affected products include: Dminnich Simple Php News.