CVE-2009-4220
Published Dec 7, 2009
Last updated 7 years ago
Overview
- Description
- PHP remote file inclusion vulnerability in includes/classes/pctemplate.php in PointComma 3.8b2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the pcConfig[smartyPath] parameter.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:raphael_mazoyer:pointcomma:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE7388E3-330B-4A6B-9877-983112AC63EA", "versionEndIncluding": "3.8b2" }, { "criteria": "cpe:2.3:a:raphael_mazoyer:pointcomma:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E52223B-1872-483D-A176-85649C38A133" }, { "criteria": "cpe:2.3:a:raphael_mazoyer:pointcomma:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8B2CE13-C29A-471C-A0BA-E9F8BD1FB68F" }, { "criteria": "cpe:2.3:a:raphael_mazoyer:pointcomma:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93F78A17-B950-4BE0-894A-31C5BB40C553" }, { "criteria": "cpe:2.3:a:raphael_mazoyer:pointcomma:3.5:beta_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D831ADB6-61FD-46F4-BC83-0D31D88989B5" }, { "criteria": "cpe:2.3:a:raphael_mazoyer:pointcomma:3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF441138-34A0-4F58-967C-72A236F4C10E" }, { "criteria": "cpe:2.3:a:raphael_mazoyer:pointcomma:3.8:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CABEB625-F8B3-4485-B66F-D28011C85E57" }, { "criteria": "cpe:2.3:a:raphael_mazoyer:pointcomma:3.51:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B4B94DA-21A9-4C56-8642-60B8E3BFDA46" }, { "criteria": "cpe:2.3:a:raphael_mazoyer:pointcomma:3.51:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61C3DA6D-B978-43D5-AF12-F2DC07913E58" }, { "criteria": "cpe:2.3:a:raphael_mazoyer:pointcomma:3.53:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8679457E-B859-4C76-B010-EB83103BBCA3" } ], "operator": "OR" } ] } ]