8.3 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.024 Low
EPSS
Percentile
89.7%
PHP remote file inclusion vulnerability in modules/bannieres/bannieres.php in Jean-Christophe Ramos SCRIPT BANNIERES (aka ban 0.1 and PLS-Bannieres 1.21) allows remote attackers to execute arbitrary PHP code via a URL in the chemin parameter. NOTE: the issue is disputed by other researchers, who observe that $chemin is defined before use
CPE | Name | Operator | Version |
---|---|---|---|
jean-christophe_ramos:pls-bannieres | jean-christophe ramos pls-bannieres | eq | 1.21 |
www.securityfocus.com/archive/1/449910/100/200/threaded
www.securityfocus.com/archive/1/449927/100/200/threaded
www.securityfocus.com/archive/1/449955/100/200/threaded
www.securityfocus.com/archive/1/450297/100/200/threaded
www.securityfocus.com/bid/20772
exchange.xforce.ibmcloud.com/vulnerabilities/29856