Description
Multiple PHP remote file inclusion vulnerabilities in Phpjobscheduler 3.0 allow remote attackers to execute arbitrary PHP code via a URL in the installed_config_file parameter to (1) add-modify.php, (2) delete.php, (3) modify.php, and (4) phpjobscheduler.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Firewall · textwebappsphp
https://www.exploit-db.com/exploits/2775
References (11)
Core 11
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/30365
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/30367
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1017264
Various Sources x_refsource_confirm
http://www.dwalker.co.uk/forum/viewtopic.php?t=564
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/1869
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/30364
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22855
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/30366
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/21041
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/451360/100/0/threaded
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/2775
Scores
EPSS
0.1788
EPSS Percentile
95.2%
Details
Status
published
Products (1)
phpjobscheduler/phpjobscheduler
3.0
Published
Nov 16, 2006
Tracked Since
Feb 18, 2026