Vulnerabilities > CVE-2005-0632 - Unspecified vulnerability in PHPnews 1.2.3/1.2.4
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
PHP remote file inclusion vulnerability in auth.php in PHPNews 1.2.4 and possibly 1.2.3, allows remote attackers to execute arbitrary PHP code via the path parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | PHPNews 1.2.3/1.2.4 Auth.PHP Remote File Include Vulnerability. CVE-2005-0632. Webapps exploit for php platform |
id | EDB-ID:25180 |
last seen | 2016-02-03 |
modified | 2005-03-01 |
published | 2005-03-01 |
reporter | mozako |
source | https://www.exploit-db.com/download/25180/ |
title | PHPNews 1.2.3/1.2.4 - Auth.PHP Remote File Include Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | PHPNEWS_REMOTE_INCLUDES.NASL |
description | The remote host is running PHPNews, an open source news application written in PHP. The installed version of PHPNews has a remote file include vulnerability in the script |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 17247 |
published | 2005-03-02 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/17247 |
title | PHPNews auth.php path Parameter Remote File Inclusion |
References
- http://marc.info/?l=bugtraq&m=110971663824719&w=2
- http://marc.info/?l=bugtraq&m=110971663824719&w=2
- http://marc.info/?l=bugtraq&m=110989169008570&w=2
- http://marc.info/?l=bugtraq&m=110989169008570&w=2
- http://secunia.com/advisories/14449
- http://secunia.com/advisories/14449
- http://securitytracker.com/id?1013345
- http://securitytracker.com/id?1013345
- http://www.securityfocus.com/bid/12696
- http://www.securityfocus.com/bid/12696