6.8
CVSSv2

CVE-2008-6313

Published: 27/02/2009 Updated: 29/09/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in addedit-render.php in phpAddEdit 1.3, when magic_quotes_gpc is disabled, allows remote malicious users to include and execute arbitrary local files via a URL in the editform parameter. NOTE: PHP remote file inclusion attacks are also likely.

Vulnerable Product Search on Vulmon Subscribe to Product

phpaddedit phpaddedit 1.3

Exploits

#phpaddedit-13 LFI #Author: nuclear #script:sourceforgenet/projects/phpaddedit/ #vuln:targetcom/addedit-renderphp?editform=///////etc/passwd%00 #vulnerable code: if (!$formname && $_GET["editform"]) $formname = $_GET["editform"]; if ( $error_message || $error || !$_POST["submitval"] ) { includ ...