{ "id": "CVE-2004-0132", "sourceIdentifier": "cve@mitre.org", "published": "2004-03-03T05:00:00.000", "lastModified": "2017-07-11T01:29:55.260", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in ezContents 2.0.2 and earlier allow remote attackers to execute arbitrary PHP code from a remote web server, as demonstrated using (1) the GLOBALS[rootdp] parameter to db.php, or (2) the GLOBALS[language_home] parameter to archivednews.php, and a malicious version of lang_admin.php." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en ezContents 2.0.2 y anteriores permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n de un servidor web remoto, como se ha demostrado usando:\r\nel par\u00e1metro GLOBALS[rootdp] de db.php, o\r\nel par\u00e1metro GLOBALS[language_home] de archivednews.php, y una versi\u00f3n maliciosa de lang_admin.php." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:1.40:*:*:*:*:*:*:*", "matchCriteriaId": "34986CA0-5D4E-44D6-849D-5CBD2820B5B6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:1.41:*:*:*:*:*:*:*", "matchCriteriaId": "8F7F91E9-7863-44A5-AAAA-94907D0F663E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:1.42:*:*:*:*:*:*:*", "matchCriteriaId": "BA801A12-208E-46CA-9383-C2DA34A80F43" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:1.43:*:*:*:*:*:*:*", "matchCriteriaId": "FAB18C7A-9D55-4EA4-B99D-7D7186B467C4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:1.44:*:*:*:*:*:*:*", "matchCriteriaId": "E26C0400-4845-44A3-9148-4B50F8F3D683" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:1.45:*:*:*:*:*:*:*", "matchCriteriaId": "262D91DB-DED7-42D4-801A-F51FDB4E01EB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:1.45b:*:*:*:*:*:*:*", "matchCriteriaId": "41C51865-7F1F-4F8A-9F83-8DF13A9B4BB6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "28F49C85-8B17-4C92-8E35-E85FCF7D3505" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "3FBB7052-B779-4D85-B639-45DB66407F24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:2.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "E37437DA-042E-4CAD-BA11-108614D8B482" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:2.0_rc2:*:*:*:*:*:*:*", "matchCriteriaId": "2DF24859-8646-41ED-9EF9-A7B4EA5EE9D2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:visualshapers:ezcontents:2.0_rc3:*:*:*:*:*:*:*", "matchCriteriaId": "C9407F37-8477-4B05-99C5-4ADD24A33F9F" } ] } ] } ], "references": [ { "url": "http://marc.info/?l=bugtraq&m=107651585921958&w=2", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15135", "source": "cve@mitre.org" } ] }