Description
Multiple PHP remote file inclusion vulnerabilities in Newscoop 3.5.x before 3.5.5 and 4 before RC4, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[g_campsiteDir] parameter to (1) include/phorum_load.php, (2) conf/install_conf.php, or (3) conf/liveuser_configuration.php.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/18752
References (8)
Core 8
Core References
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/18752
Various Sources x_refsource_confirm
http://www.sourcefabric.org/en/newscoop/latestrelease/1141/Newscoop-355-and-Newscoop-4-RC4-security-releases.htm
Exploit x_refsource_misc
http://dev.sourcefabric.org/browse/CS-4179
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-04/0130.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/53147
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/48769
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/75031
Exploit x_refsource_misc
https://www.htbridge.com/advisory/HTB23084
Scores
EPSS
0.0652
EPSS Percentile
91.1%
Details
CWE
CWE-94
Status
published
Products (6)
sourcefabric/newscoop
3.5.0
sourcefabric/newscoop
3.5.1
sourcefabric/newscoop
3.5.2
sourcefabric/newscoop
3.5.3
sourcefabric/newscoop
3.5.4
sourcefabric/newscoop
4.0 rc3
Published
Aug 27, 2012
Tracked Since
Feb 18, 2026