First published: Wed Sep 21 2005(Updated: )
Direct static code injection vulnerability in the flood protection feature in inc/shows.inc.php in CuteNews 1.4.0 and earlier allows remote attackers to execute arbitrary PHP code via the HTTP_CLIENT_IP header (Client-Ip), which is injected into data/flood.db.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CutePHP CuteNews | <=1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3010 is considered to have a high severity due to the potential for remote code execution.
To fix CVE-2005-3010, upgrade CuteNews to version 1.4.1 or later, which addresses the vulnerability.
CVE-2005-3010 can be exploited by sending a crafted HTTP_CLIENT_IP header that injects PHP code.
CuteNews versions 1.4.0 and earlier are affected by CVE-2005-3010.
CVE-2005-3010 is a direct static code injection vulnerability.