- Description
- Multiple PHP remote file inclusion vulnerabilities in Study planner (Studiewijzer) 0.15 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the SPL_CFG[dirroot] parameter to (1) service.alert.inc.php or (2) settings.ses.php in inc/; (3) db/mysql/db.inc.php; (4) integration/shortstat/configuration.php; (5) ali.class.php or (6) cat.class.php in methodology/traditional/class/; (7) cat_browse.inc.php, (8) chr_browse.inc.php, (9) chr_display.inc.php, or (10) dash_browse.inc.php in methodology/traditional/ui/inc/; (11) spl.webservice.php or (12) konfabulator/gateway_admin.php in ws/; or other unspecified files.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:studiewijzer:studiewijzer:0.13:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "315A15E1-A100-4DBF-9A06-5B2C4CEDFB75"
},
{
"criteria": "cpe:2.3:a:studiewijzer:studiewijzer:0.14:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EA17E3AE-BB3B-4DD2-9B75-D369AF5108A5"
},
{
"criteria": "cpe:2.3:a:studiewijzer:studiewijzer:0.15:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "509970E6-37F6-4F21-B73D-C2171E7BB484"
}
],
"operator": "OR"
}
]
}
]