{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2005-3738", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "globals.php in Mambo Site Server 4.0.14 and earlier, when register_globals is disabled, allows remote attackers to overwrite variables in the GLOBALS array and conduct various attacks, as demonstrated using the mosConfig_absolute_path parameter to content.html.php for remote PHP file inclusion." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20051116 mambo remote code sexecution", "refsource" : "FULLDISC", "url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0520.html" }, { "name" : "20051118 Mambo 0day Exploit out in the wild - mambo/skype hacked", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/417215" }, { "name" : "http://forum.mamboserver.com/showthread.php?t=66154", "refsource" : "CONFIRM", "url" : "http://forum.mamboserver.com/showthread.php?t=66154" }, { "name" : "20060307 PHP-based CMS mass-exploitation", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/426942/100/0/threaded" }, { "name" : "20060308 RE: [Full-disclosure] PHP-based CMS mass-exploitation", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/427196/100/0/threaded" }, { "name" : "15461", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/15461" }, { "name" : "ADV-2005-2473", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2005/2473" }, { "name" : "1015258", "refsource" : "SECTRACK", "url" : "http://securitytracker.com/id?1015258" }, { "name" : "17622", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/17622" } ] } }