7.5
CVSSv2

CVE-2005-0859

Published: 02/05/2005 Updated: 19/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

PHP remote file inclusion vulnerability in CzarNews 1.13b allows remote malicious users to execute arbitrary PHP code via the tpath parameter to (1) headlines.php or (2) news.php. NOTE: some sources have reported the "dir" parameter as being affected; however, this is likely a cut-and-paste error from the wrong section of the original vulnerability report. Also, the news.php version was later reported to be in 1.12 up to and including 1.14.

Vulnerable Product Search on Vulmon Subscribe to Product

czaries network czarnews 1.13b

Exploits

source: wwwsecurityfocuscom/bid/12857/info CzarNews is prone to a remote file-include vulnerability An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process This may facilitate unauthorized access CzarNews 113b is reported vulnerable; other ...
================================================================= CzarNews <= (tpath) Remote File Inclusion Exploit ================================================================ | Critical Level : Dangerous | ...