CVE-2003-1252

Current Description

register.php in S8Forum 3.0 allows remote attackers to execute arbitrary PHP commands by creating a user whose name ends in a .php extension and entering the desired commands into the E-mail field, which creates a web-accessible .php file that can be called by the attacker, as demonstrated using a "system($cmd)" E-mail address with a "any_name.php" username.

Basic Data

PublishedDecember 31, 2003
Last ModifiedSeptember 05, 2008
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationKelli ShaverS8forum3.0*******

Vulnerable Software List

VendorProductVersions
Kelli Shaver S8forum 3.0

References

NameSourceURLTags
20030105 A security vulnerability in S8Forumhttp://archives.neohapsis.com/archives/vulnwatch/2003-q1/0004.htmlVULNWATCHExploit Vendor Advisory
7819http://secunia.com/advisories/7819SECUNIA
s8forum-register-command-execution(10974)http://www.iss.net/security_center/static/10974.phpXF
20030105 A security vulnerability in S8Forumhttp://www.securityfocus.com/archive/1/305406BUGTRAQExploit Vendor Advisory
6547http://www.securityfocus.com/bid/6547BIDExploit
1005881http://www.securitytracker.com/id?1005881SECTRACK