Multiple PHP remote file inclusion vulnerabilities in Campware Campsite before 2.6.2 allow remote attackers to execute arbitrary PHP code via a URL in the g_documentRoot parameter to (1) Alias.php, (2) Article.php, (3) ArticleAttachment.php, (4) ArticleComment.php, (5) ArticleData.php, (6) ArticleImage.php, (7) ArticleIndex.php, (8) ArticlePublish.php, (9) ArticleTopic.php, (10) ArticleType.php, (11) ArticleTypeField.php, (12) Attachment.php, (13) Country.php, (14) DatabaseObject.php, (15) Event.php, (16) IPAccess.php, (17) Image.php, (18) Issue.php, (19) IssuePublish.php, (20) Language.php, (21) Log.php, (22) LoginAttempts.php, (23) Publication.php, (24) Section.php, (25) ShortURL.php, (26) Subscription.php, (27) SubscriptionDefaultTime.php, (28) SubscriptionSection.php, (29) SystemPref.php, (30) Template.php, (31) TimeUnit.php, (32) Topic.php, (33) UrlType.php, (34) User.php, and (35) UserType.php in implementation/management/classes/; (36) configuration.php and (37) db_connect.php in implementation/management/; and (38) LocalizerConfig.php and (39) LocalizerLanguage.php in implementation/management/priv/localizer/.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Multiple PHP remote file inclusion vulnerabilities in Campware Campsite before 2.6.2 allow remote attackers to execute arbitrary PHP code via a URL in the g_documentRoot parameter to (1) Alias.php, (2) Article.php, (3) ArticleAttachment.php, (4) ArticleComment.php, (5) ArticleData.php, (6) ArticleImage.php, (7) ArticleIndex.php, (8) ArticlePublish.php, (9) ArticleTopic.php, (10) ArticleType.php, (11) ArticleTypeField.php, (12) Attachment.php, (13) Country.php, (14) DatabaseObject.php, (15) Event.php, (16) IPAccess.php, (17) Image.php, (18) Issue.php, (19) IssuePublish.php, (20) Language.php, (21) Log.php, (22) LoginAttempts.php, (23) Publication.php, (24) Section.php, (25) ShortURL.php, (26) Subscription.php, (27) SubscriptionDefaultTime.php, (28) SubscriptionSection.php, (29) SystemPref.php, (30) Template.php, (31) TimeUnit.php, (32) Topic.php, (33) UrlType.php, (34) User.php, and (35) UserType.php in implementation/management/classes/; (36) configuration.php and (37) db_connect.php in implementation/management/; and (38) LocalizerConfig.php and (39) LocalizerLanguage.php in implementation/management/priv/localizer/.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.osvdb.org/34217 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34215 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34189 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34214 | vdb-entry x_refsource_OSVDB x_transferred |
http://sourceforge.net/project/shownotes.php?release_id=459574&group_id=66936 | x_refsource_CONFIRM x_transferred |
http://www.osvdb.org/34198 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34195 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34205 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34187 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34208 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34216 | vdb-entry x_refsource_OSVDB x_transferred |
http://code.campware.org/projects/campsite/ticket/2349 | x_refsource_CONFIRM x_transferred |
http://www.osvdb.org/34224 | vdb-entry x_refsource_OSVDB x_transferred |
http://code.campware.org/projects/campsite/query?milestone=2.6.2 | x_refsource_CONFIRM x_transferred |
http://www.osvdb.org/34197 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34221 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34213 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34209 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34211 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34191 | vdb-entry x_refsource_OSVDB x_transferred |
http://code.campware.org/projects/campsite/changeset/6057 | x_refsource_CONFIRM x_transferred |
http://www.osvdb.org/34225 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34203 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34200 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34222 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34223 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34218 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34206 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34199 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34196 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34219 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34201 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.securityfocus.com/bid/23874 | vdb-entry x_refsource_BID x_transferred |
http://www.osvdb.org/34192 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34210 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34188 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34204 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34202 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34190 | vdb-entry x_refsource_OSVDB x_transferred |
http://code.campware.org/projects/campsite/changeset/6058 | x_refsource_CONFIRM x_transferred |
http://www.osvdb.org/34220 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34207 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34193 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34194 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/34212 | vdb-entry x_refsource_OSVDB x_transferred |
Multiple PHP remote file inclusion vulnerabilities in Campware Campsite before 2.6.2 allow remote attackers to execute arbitrary PHP code via a URL in the g_documentRoot parameter to (1) Alias.php, (2) Article.php, (3) ArticleAttachment.php, (4) ArticleComment.php, (5) ArticleData.php, (6) ArticleImage.php, (7) ArticleIndex.php, (8) ArticlePublish.php, (9) ArticleTopic.php, (10) ArticleType.php, (11) ArticleTypeField.php, (12) Attachment.php, (13) Country.php, (14) DatabaseObject.php, (15) Event.php, (16) IPAccess.php, (17) Image.php, (18) Issue.php, (19) IssuePublish.php, (20) Language.php, (21) Log.php, (22) LoginAttempts.php, (23) Publication.php, (24) Section.php, (25) ShortURL.php, (26) Subscription.php, (27) SubscriptionDefaultTime.php, (28) SubscriptionSection.php, (29) SystemPref.php, (30) Template.php, (31) TimeUnit.php, (32) Topic.php, (33) UrlType.php, (34) User.php, and (35) UserType.php in implementation/management/classes/; (36) configuration.php and (37) db_connect.php in implementation/management/; and (38) LocalizerConfig.php and (39) LocalizerLanguage.php in implementation/management/priv/localizer/.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |
Multiple PHP remote file inclusion vulnerabilities in Campware Campsite before 20061110 allow remote attackers to execute arbitrary PHP code via a URL in the g_documentRoot parameter to (1) bugreporter/thankyou.php and (2) feedback/thankyou.php in implementation/management/priv/.
SQL injection vulnerability in the ArticleAttachment::GetAttachmentsByArticleNumber method in javascript/tinymcs/plugins/campsiteattachment/attachments.php in Campsite 3.3.5 and earlier allows remote attackers to execute arbitrary SQL commands via the article_id parameter.
Directory traversal vulnerability in admin-files/ad.php in Campsite 3.3.0 RC1 allows remote attackers to read and possibly execute arbitrary local files via a .. (dot dot) in the GLOBALS[g_campsiteDir] parameter.