7.8 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.225 Low
EPSS
Percentile
96.4%
Multiple PHP remote file inclusion vulnerabilities in TagIt! Tagboard 2.1.B Build 2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) configpath parameter to (a) tagviewer.php, (b) tag_process.php, and © CONFIG/errmsg.inc.php; and (d) addTagmin.php, (e) ban_watch.php, (f) delTagmin.php, (g) delTag.php, (h) editTagmin.php, (i) editTag.php, (j) manageTagmins.php, and (k) verify.php in tagmin/; the (2) adminpath parameter to (l) tagviewer.php, (m) tag_process.php, and (n) tagmin/index.php; and the (3) admin parameter to (o) readconf.php, (p) updateconf.php, (q) updatefilter.php, and ® wordfilter.php in tagmin/; different vectors than CVE-2006-5249.
CPE | Name | Operator | Version |
---|---|---|---|
tagboard | eq | <= 2.1.bbuild2 |
advisories.echo.or.id/adv/adv65-K-159-2007.txt
www.osvdb.org/34603
www.osvdb.org/34604
www.osvdb.org/34605
www.osvdb.org/34606
www.osvdb.org/34607
www.osvdb.org/34608
www.osvdb.org/34609
www.osvdb.org/34610
www.osvdb.org/34611
www.osvdb.org/34612
www.osvdb.org/34613
www.osvdb.org/34614
www.osvdb.org/34615
www.osvdb.org/34616
www.osvdb.org/34617
www.osvdb.org/34618
www.securityfocus.com/bid/22518
www.vupen.com/english/advisories/2007/0557
exchange.xforce.ibmcloud.com/vulnerabilities/32436