Vulnerabilities > CVE-2001-1370 - Remote Script Execution vulnerability in Multiple Vendor PHPLIB

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
phplib-team
critical
nessus
exploit available

Summary

prepend.php3 in PHPLib before 7.2d, when register_globals is enabled for PHP, allows remote attackers to execute arbitrary scripts via an HTTP request that modifies $_PHPLIB[libdir] to point to malicious code on another server, as seen in Horde 1.2.5 and earlier, IMP before 2.2.6, and other packages that use PHPLib.

Vulnerable Configurations

Part Description Count
Application
Phplib_Team
4

Exploit-Db

descriptionPHPLib Team PHPLIB 7.2 Remote Script Execution Vulnerability. CVE-2001-1370. Webapps exploit for php platform
idEDB-ID:21022
last seen2016-02-02
modified2001-07-21
published2001-07-21
reportergiancarlo pinerolo
sourcehttps://www.exploit-db.com/download/21022/
titlePHPLib Team PHPLIB 7.2 - Remote Script Execution Vulnerability

Nessus

NASL familyDebian Local Security Checks
NASL idDEBIAN_DSA-073.NASL
descriptionThe Horde team released version 2.2.6 of IMP (a web-based IMAP mail program) which fixes three security problems. Their release announcement describes them as follows : - A PHPLIB vulnerability allowed an attacker to provide a value for the array element $_PHPLIB[libdir], and thus to get scripts from another server to load and execute. This vulnerability is remotely exploitable. (Horde 1.2.x ships with its own customized version of PHPLIB, which has now been patched to prevent this problem.) - By using tricky encodings of
last seen2020-06-01
modified2020-06-02
plugin id14910
published2004-09-29
reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/14910
titleDebian DSA-073-1 : imp - 3 remote exploits