Executive Summary
Summary | |
---|---|
Title | PHPCow file inclusion vulnerability |
Informations | |||
---|---|---|---|
Name | VU#515417 | First vendor Publication | 2008-11-19 |
Vendor | VU-CERT | Last vendor Modification | 2008-11-19 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#515417PHPCow file inclusion vulnerabilityOverviewOlder versions of PHPCow may contain a file inclusion vulnerability that could allow an attacker to take control of a vulnerable application.I. DescriptionPHPCow is a content management system that uses PHP. Older versions of PHP may have contained a file inclusion vulnerability.II. ImpactA remote attacker may be able to take control of a vulnerable PHPCow application.III. SolutionUpgradeThe PHPCow suppport team has reported that recent versions of PHPCow addressed this issue. Contact PHPCow for more information about obtaining updated software.
Workarounds for users
Systems Affected
References
This document was written by Ryan Giobbi.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/515417 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
50209 | PHPCow Unspecified Arbitrary Remote Code Execution |