Description
Phorum 3.3.2a allows remote attackers to execute arbitrary commands via an HTTP request to (1) plugin.php, (2) admin.php, or (3) del.php that modifies the PHORUM[settings_dir] variable to point to a directory that contains a PHP file with the commands.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by markus arndt · textwebappsphp
https://www.exploit-db.com/exploits/21459
References (5)
Core 5
Core References
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/4763
Vendor Advisory x_refsource_confirm
http://www.phorum.org/
Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2002-05/0153.html
Patch, Vendor Advisory vdb-entry
x_refsource_xf
http://www.iss.net/security_center/static/9107.php
Third Party Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2002-05/0147.html
Scores
EPSS
0.1287
EPSS Percentile
94.1%
Details
Status
published
Products (1)
phorum/phorum
3.3.2a
Published
Aug 12, 2002
Tracked Since
Feb 18, 2026