CVE-2008-2074

Successkid Harris Wap Chat - Code Injection

Title source: rule
STIX 2.1

Description

Multiple PHP remote file inclusion vulnerabilities Harris Yusuf Arifin Harris Wap Chat 1.0, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the sysFileDir parameter to (1) eng.writeMsg.php, (2) eng.adCreate.php, (3) eng.adCreateSave.php, (4) eng.adDispByTypeOptions.php, (5) eng.createRoom.php, (6) eng.forward.php, (7) eng.pageLogout.php, (8) eng.resultMember.php, (9) eng.roomDeleteConfirm.php, (10) eng.saveNewRoom.php, and (11) eng.searchMember.php in src/.

Exploits (1)

exploitdb WRITEUP VERIFIED
by k1n9k0ng · textwebappsphp
https://www.exploit-db.com/exploits/5525

References (4)

Core 4
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28995
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42112
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5525
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30022

Scores

EPSS 0.0414
EPSS Percentile 88.7%

Details

CWE
CWE-94
Status published
Products (1)
successkid/harris_wap_chat 1.0
Published May 05, 2008
Tracked Since Feb 18, 2026