CVE-2003-1412

Gonicus System Administration - Code Injection

Title source: rule
STIX 2.1

Description

PHP remote file inclusion vulnerability in index.php for GONiCUS System Administrator (GOsa) 1.0 allows remote attackers to execute arbitrary PHP code via the plugin parameter to (1) 3fax/1blocklists/index.php; (2) 6departamentadmin/index.php, (3) 5terminals/index.php, (4) 4mailinglists/index.php, (5) 3departaments/index.php, and (6) 2groupd/index.php in 2administration/; or (7) the base parameter to include/help.php.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Karol Wiesek · textwebappsphp
https://www.exploit-db.com/exploits/22279

References (6)

Core 6
Core References
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/8120
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/11408
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/313282/30/25760/threaded
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/6922
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1006162

Scores

EPSS 0.0474
EPSS Percentile 89.5%

Details

CWE
CWE-94
Status published
Products (1)
gonicus/gonicus_system_administration 1.0
Published Dec 31, 2003
Tracked Since Feb 18, 2026