Vulnerabilities > CVE-2005-2775 - Unspecified vulnerability in PHPwebnotes 2.0.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | PHPWebNotes 2.0 Api.PHP Remote File Include Vulnerability. CVE-2005-2775. Webapps exploit for php platform |
id | EDB-ID:26201 |
last seen | 2016-02-03 |
modified | 2005-08-29 |
published | 2005-08-29 |
reporter | [email protected] |
source | https://www.exploit-db.com/download/26201/ |
title | PHPWebNotes 2.0 Api.PHP Remote File Include Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | PHPWEBNOTES_T_PATH_CORE_FILE_INCLUDE.NASL |
description | The remote host is running phpWebNotes, an open source page annotation system modeled after php.net. The version of phpWebNotes installed on the remote host allows attackers to control the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19521 |
published | 2005-08-29 |
reporter | This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/19521 |
title | phpWebNotes core/api.php t_path_core Parameter File Inclusion |
code |
|
References
- http://marc.info/?l=bugtraq&m=112516693300371&w=2
- http://marc.info/?l=bugtraq&m=112516693300371&w=2
- http://www.securityfocus.com/bid/14679
- http://www.securityfocus.com/bid/14679
- http://www.securitytracker.com/alerts/2005/Aug/1014807.html
- http://www.securitytracker.com/alerts/2005/Aug/1014807.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22040
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22040