The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment ( estimation calculated on ). Technical details and a public exploit are known. The exploitation doesn't require any form of authentication. It is possible to launch the attack remotely. This vulnerability is traded as CVE-2008-1989 since. PHP remote file inclusion vulnerability in 123flashchat.php in the 123 Flash Chat 6.8.0 module for e107, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the e107path parameter. This is going to have an impact on confidentiality, integrity, and availability. The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. The manipulation of the argument e107path with an unknown input leads to a code injection vulnerability. Affected is an unknown functionality of the file 123flashchat.php. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability was found in 123 Flash Chat Module 6.8.0 on e107 ( Chat Software). The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |