Description
class.atkdateattribute.js.php in Achievo 0.7.0 through 0.9.1, except 0.8.2, allows remote attackers to execute arbitrary PHP code when the 'allow_url_fopen' setting is enabled via a URL in the config_atkroot parameter that points to the code.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Jeroen Latour · textwebappsphp
https://www.exploit-db.com/exploits/21745
References (4)
Core 4
Core References
Exploit, Patch, Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2002-08/0235.html
Various Sources x_refsource_confirm
http://www.achievo.org/lists/2002/Aug/msg00092.html
Patch, Vendor Advisory vdb-entry
x_refsource_xf
http://www.iss.net/security_center/static/9947.php
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/5552
Scores
EPSS
0.0577
EPSS Percentile
90.6%
Details
Status
published
Products (10)
achievo/achievo
0.7.0
achievo/achievo
0.7.1
achievo/achievo
0.7.2
achievo/achievo
0.7.3
achievo/achievo
0.8.0
achievo/achievo
0.8.0_rc1
achievo/achievo
0.8.0_rc2
achievo/achievo
0.8.1
achievo/achievo
0.9.0
achievo/achievo
0.9.1
Published
Apr 11, 2003
Tracked Since
Feb 18, 2026