Vulnerabilities > CVE-2003-1256 - Unspecified vulnerability in E-Theni
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
aff_liste_langue.php in E-theni allows remote attackers to execute arbitrary PHP code by modifying the rep_include parameter to reference a URL on a remote web server that contains para_langue.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | E-theni Remote Include Command Execution Vulnerability. CVE-2003-1256. Webapps exploit for php platform |
id | EDB-ID:22293 |
last seen | 2016-02-02 |
modified | 2003-01-06 |
published | 2003-01-06 |
reporter | frog |
source | https://www.exploit-db.com/download/22293/ |
title | E-theni Remote Include Command Execution Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | ETHENI_CODE_INJECTION.NASL |
description | It is possible to make the remote host include PHP files hosted on a third-party server using E-Theni. An attacker may use this flaw to inject arbitrary code in the remote host and gain a shell with the privileges of the web server. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11497 |
published | 2003-03-28 |
reporter | This script is Copyright (C) 2003-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/11497 |
title | E-theni aff_liste_langue.php rep_include Parameter Remote File Inclusion |
code |
|
References
- http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0009.html
- http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0009.html
- http://www.iss.net/security_center/static/11013.php
- http://www.iss.net/security_center/static/11013.php
- http://www.securityfocus.com/archive/1/305381
- http://www.securityfocus.com/archive/1/305381
- http://www.securityfocus.com/bid/6970
- http://www.securityfocus.com/bid/6970