CVE-2008-2224

Sazcart - Code Injection

Title source: rule
STIX 2.1

Description

Multiple PHP remote file inclusion vulnerabilities in SazCart 1.5.1, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) _saz[settings][site_dir] parameter to layouts/default/header.saz.php and the (2) _saz[settings][site_url] parameter to admin/alayouts/default/pages/login.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by RoMaNcYxHaCkEr · textwebappsphp
https://www.exploit-db.com/exploits/5566

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42289
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29113
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5566
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30148

Scores

EPSS 0.0414
EPSS Percentile 88.7%

Details

CWE
CWE-94
Status published
Products (1)
sazcart/sazcart 1.5.1
Published May 14, 2008
Tracked Since Feb 18, 2026