[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2010-1946Date: (C)2010-05-19   (M)2023-12-22


Multiple PHP remote file inclusion vulnerabilities in openMairie Openregistrecil 1.02, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the path_om parameter to (1) autorisation_normale.class.php, (2) collectivite.class.php, (3) dossier.class.php, (4) norme_simplifiee.class.php, (5) registre.class.php, (6) autorisation_unique.class.php, (7) demande_avis.class.php, (8) droit.class.php, (9) organisme.class.php, (10) service.class.php, (11) categorie_donnee.class.php, (12) destinataire.class.php, (13) profil.class.php, (14) tabdyn_visu.class.php, (15) categorie_personne.class.php, (16) dispense.class.php, (17) modificatif.class.php, (18) reference.class.php, and (19) utilisateur.class.php in obj/.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 8.6
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
EXPLOIT-DB-12313
SECUNIA-39534
BID-39611
OSVDB-63945
OSVDB-63946
OSVDB-63947
OSVDB-63948
OSVDB-63949
OSVDB-63950
OSVDB-63951
OSVDB-63952
OSVDB-63953
OSVDB-63954
OSVDB-63955
OSVDB-63956
OSVDB-63957
OSVDB-63958
OSVDB-63959
OSVDB-63960
OSVDB-63961
OSVDB-63962
OSVDB-63963
http://packetstormsecurity.org/1004-exploits/openregistrecil-rfilfi.txt

CWE    1
CWE-94

© SecPod Technologies