Description
Multiple PHP remote file inclusion vulnerabilities in phpChess Community Edition 2.0 allow remote attackers to execute arbitrary PHP code via a URL in (1) the config parameter to includes/language.php, or the Root_Path parameter to (2) layout_admin_cfg.php, (3) layout_cfg.php, or (4) layout_t_top.php in skins/phpchess/. NOTE: vector 1 has been disputed by CVE, since the code is defined within a function that is not called from within includes/language.php.
Exploits (1)
References (10)
Core 10
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/23797
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/34056
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/35593
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/35595
Various Sources mailing-list
x_refsource_vim
http://attrition.org/pipermail/vim/2007-May/001586.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/35594
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/35592
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/1649
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/3837
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/25147
Scores
EPSS
0.0913
EPSS Percentile
92.7%
Details
Status
published
Products (1)
phpchess/phpchess
2.0
Published
May 14, 2007
Tracked Since
Feb 18, 2026