Description
Multiple PHP remote file inclusion vulnerabilities in osDate 2.1.9 and 2.5.4, when magic_quotes_gpc is disabled and register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the config[forum_installed] parameter to (1) forum/adminLogin.php and (2) forum/userLogin.php. NOTE: some of these details are obtained from third party information.
Exploits (1)
References (7)
Core 7
Core References
Exploit x_refsource_misc
http://evilc0de.blogspot.com/2010/03/osdate-rfi-vuln.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38943
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/63005
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/11755
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/63006
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/38738
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/56909
Scores
EPSS
0.0361
EPSS Percentile
87.8%
Details
CWE
CWE-94
Status
published
Products (2)
tufat/osdate
2.1.9
tufat/osdate
2.5.4
Published
Mar 23, 2010
Tracked Since
Feb 18, 2026