Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-1894 | First vendor Publication | 2005-06-09 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Direct code injection vulnerability in FlatNuke 2.5.3 allows remote attackers to execute arbitrary PHP code by placing the code into the Referer header of an HTTP request, which causes the code to be injected into referer.php, which can then be accessed by the attacker. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1894 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-35 | Leverage Executable Code in Nonexecutable Files |
CAPEC-63 | Simple Script Injection |
CAPEC-73 | User-Controlled Filename |
CAPEC-77 | Manipulating User-Controlled Variables |
CAPEC-81 | Web Logs Tampering |
CAPEC-85 | Client Network Footprinting (using AJAX/XSS) |
CAPEC-86 | Embedding Script (XSS ) in HTTP Headers |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
17166 | FlatNuke referer.php Crafted Referer Arbitrary PHP Code Execution FlatNuke contains a flaw that may allow a malicious user to execute arbitrary PHP command. The issue is due to insufficient input validation in the referer.php script. When an attacker first sends a specially crafted request with a spoofed referer field to the website, then directly accesses the referer.php script, the website will execute the PHP commands in the referer field. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:06 |
|
2024-11-28 12:07:10 |
|
2024-02-13 21:27:58 |
|
2021-05-04 12:03:01 |
|
2021-04-22 01:03:16 |
|
2020-05-23 00:16:37 |
|
2016-04-26 13:35:55 |
|
2013-05-11 11:27:00 |
|