漏洞标题
N/A
漏洞描述信息
**争议**
在phpopenchat的contrib/yabbse/poc.php文件在3.0.2之前,该文件的PHP远程包含漏洞允许远程攻击者通过源目录参数执行任意PHP代码。注意:这个问题是由一名第三方研究者提出的,他指出,_REQUEST参数在文件开头动态地被取消。另一名研究者指出,并且CVE同意,可以绕过取消PHP函数(CVE-2006-3017)。如果这个问题是由于PHP的漏洞导致的,那么它应该被排除在CVE之外。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
PHP remote file inclusion vulnerability in contrib/yabbse/poc.php in phpopenchat before 3.0.2 allows remote attackers to execute arbitrary PHP code via the sourcedir parameter. NOTE: this issue was disputed by a third-party researcher who stated that the _REQUEST parameters were dynamically unset at the beginning of the file. Another researcher noted, and CVE agrees, that the unset PHP function can be bypassed (CVE-2006-3017). If this issue is due to a vulnerability in PHP, then it should be excluded from CVE
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
phpopenchat 'poc.php' PHP远程文件包含漏洞
漏洞描述信息
phpopenchat 3.0.2之前版本的contrib/yabbse/poc.php中的PHP远程文件包含漏洞,远程攻击者可以通过sourcedir参数执行任意PHP代码。
CVSS信息
N/A
漏洞类别
授权问题