Vulnerabilities > CVE-2004-1592 - Remote File Include vulnerability in Ocportal 1.0.3

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
ocportal
nessus
exploit available

Summary

PHP remote file inclusion vulnerability in index.php in ocPortal 1.0.3 and earlier allows remote attackers to execute arbitrary PHP code by modifying the req_path parameter to reference a URL on a remote web server that contains a malicious funcs.php script.

Vulnerable Configurations

Part Description Count
Application
Ocportal
1

Exploit-Db

descriptionocPortal 1.0.3 Remote File Inclusion. CVE-2004-1592. Webapps exploit for php platform
idEDB-ID:574
last seen2016-01-31
modified2004-10-13
published2004-10-13
reporterExoduks
sourcehttps://www.exploit-db.com/download/574/
titleocPortal 1.0.3 - Remote File Inclusion

Nessus

NASL familyCGI abuses
NASL idOCP_PORTAL_FILE_INCLUDE.NASL
descriptionThe remote host is running ocPortal, a content management system written in PHP. There is a bug in the remote version of this software which may allow an attacker to execute arbitrary commands on the remote host by using a file inclusion bug in the file
last seen2020-06-01
modified2020-06-02
plugin id15468
published2004-10-13
reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/15468
titleocPortal index.php req_path Parameter Remote File Inclusion