Description
PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string.
Published: 2005-05-10
Score: 7.5 High
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2004-2036 PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string.
History

No history.

Subscriptions

Francisco Burzi Php-nuke
Oscommerce Osc2nuke
Paul Laudanski Betanc Php-nuke
Trustix Secure Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T01:15:01.619Z

Reserved: 2005-05-04T00:00:00.000Z

Link: CVE-2004-2044

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2004-06-01T04:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2004-2044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses