Description
PHP remote file inclusion vulnerability in HotNews 0.7.2 and earlier allows remote attackers to execute arbitrary PHP code via the (1) config[header] parameter to hotnews-engine.inc.php3 or (2) config[incdir] parameter to hnmain.inc.php3.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Officerrr · textwebappsphp
https://www.exploit-db.com/exploits/23517
exploitdb
WORKING POC
VERIFIED
by Officerrr · textwebappsphp
https://www.exploit-db.com/exploits/23518
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/3332
Exploit, Patch mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/348840
Patch third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10551
Exploit, Patch vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1008608
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/3405
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/14140
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9357
Patch x_refsource_confirm
http://sourceforge.net/forum/forum.php?forum_id=342594
Scores
EPSS
0.1324
EPSS Percentile
94.2%
Details
Status
published
Products (7)
hotnews/hotnews
0.5.3
hotnews/hotnews
0.6.0
hotnews/hotnews
0.6.0_pre
hotnews/hotnews
0.6.1
hotnews/hotnews
0.7.0
hotnews/hotnews
0.7.1
hotnews/hotnews
0.7.2
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026