| Summary | Eval injection vulnerability in index.php in ClanSys 1.1 allows remote attackers to execute arbitrary PHP code via PHP code in the page parameter, as demonstrated by using an "include" statement that is injected into the eval statement. NOTE: this issue has been described as file inclusion by some sources, but that is just one attack; the primary vulnerability is eval injection. |
|---|---|
| Publication Date | April 25, 2006, 9:50 p.m. |
| Registration Date | Jan. 29, 2021, 3:36 p.m. |
| Last Update | Oct. 19, 2018, 1:37 a.m. |
| CVSS2.0 : HIGH | |
| Score | 7.5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | はい |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:clansys:clansys:1.1:*:*:*:*:*:*:* | |||||
| Title | clansys における脆弱性 |
|---|---|
| Summary | clansys には、不特定の脆弱性が存在します。 |
| Possible impacts | |
| Solution | 参考情報を参照して適切な対策を実施してください。 |
| Publication Date | April 25, 2006, midnight |
| Registration Date | Sept. 5, 2024, 1:48 p.m. |
| Last Update | Sept. 5, 2024, 1:48 p.m. |
| clansys |
| clansys 1.1 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2024年09月05日] 掲載 |
Sept. 5, 2024, 1:48 p.m. |