Vulnerabilities > CVE-2001-1370 - Remote Script Execution vulnerability in Multiple Vendor PHPLIB
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
prepend.php3 in PHPLib before 7.2d, when register_globals is enabled for PHP, allows remote attackers to execute arbitrary scripts via an HTTP request that modifies $_PHPLIB[libdir] to point to malicious code on another server, as seen in Horde 1.2.5 and earlier, IMP before 2.2.6, and other packages that use PHPLib.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Exploit-Db
description | PHPLib Team PHPLIB 7.2 Remote Script Execution Vulnerability. CVE-2001-1370. Webapps exploit for php platform |
id | EDB-ID:21022 |
last seen | 2016-02-02 |
modified | 2001-07-21 |
published | 2001-07-21 |
reporter | giancarlo pinerolo |
source | https://www.exploit-db.com/download/21022/ |
title | PHPLib Team PHPLIB 7.2 - Remote Script Execution Vulnerability |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-073.NASL |
description | The Horde team released version 2.2.6 of IMP (a web-based IMAP mail program) which fixes three security problems. Their release announcement describes them as follows : - A PHPLIB vulnerability allowed an attacker to provide a value for the array element $_PHPLIB[libdir], and thus to get scripts from another server to load and execute. This vulnerability is remotely exploitable. (Horde 1.2.x ships with its own customized version of PHPLIB, which has now been patched to prevent this problem.) - By using tricky encodings of |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14910 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14910 |
title | Debian DSA-073-1 : imp - 3 remote exploits |
References
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-027.0.txt
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000410
- http://marc.info/?l=bugtraq&m=99616122712122&w=2
- http://online.securityfocus.com/archive/1/198495
- http://www.debian.org/security/2001/dsa-073
- http://www.iss.net/security_center/static/6892.php
- http://www.securityfocus.com/archive/1/198768
- http://www.securityfocus.com/bid/3079