PHP remote file inclusion vulnerability in nucleus/plugins/NP_Twitter.php in the NP_Twitter Plugin 0.8 and 0.9 for Nucleus, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the DIR_PLUGINS parameter. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://www.osvdb.org/65007 | Exploit |
http://www.vupen.com/english/advisories/2010/1284 | Vendor Advisory |
http://packetstormsecurity.org/1005-exploits/nucleustwitter-rfi.txt | Exploit |
http://secunia.com/advisories/39997 | Vendor Advisory |
http://www.securityfocus.com/bid/40453 | Exploit |
http://www.exploit-db.com/exploits/12790/ | Exploit |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2010-06-17 09:30
Updated : 2010-06-17 21:00
NVD link : CVE-2010-2314
Mitre link : CVE-2010-2314
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
nucleus_group
- nucleus_cms
edmondhui.homeip
- np_twitter