Vulnerability Details : CVE-2004-1315
Public exploit exists!
viewtopic.php in phpBB 2.x before 2.0.11 improperly URL decodes the highlight parameter when extracting words and phrases to highlight, which allows remote attackers to execute arbitrary PHP code by double-encoding the highlight value so that special characters are inserted into the result, which is then processed by PHP exec, as exploited by the Santy.A worm.
Exploit prediction scoring system (EPSS) score for CVE-2004-1315
Probability of exploitation activity in the next 30 days: 96.27%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2004-1315
-
phpBB viewtopic.php Arbitrary Code Execution
Disclosure Date: 2004-11-12First seen: 2020-04-26exploit/unix/webapp/phpbb_highlightThis module exploits two arbitrary PHP code execution flaws in the phpBB forum system. The problem is that the 'highlight' parameter in the 'viewtopic.php' script is not verified properly and will allow an attacker to inject arbitrary code via preg_replace().
CVSS scores for CVE-2004-1315
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2004-1315
-
http://www.kb.cert.org/vuls/id/497400
Patch;Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/archive/1/385208
-
http://www.phpbb.com/phpBB/viewtopic.php?t=240513
Vendor Advisory
-
http://marc.info/?l=bugtraq&m=110365752909029&w=2
-
http://www.us-cert.gov/cas/techalerts/TA04-356A.html
Patch;Third Party Advisory;US Government Resource
-
https://security.gentoo.org/glsa/200411-32
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/18052
-
http://marc.info/?l=bugtraq&m=110029415208724&w=2
-
http://marc.info/?t=110079440800004&r=1&w=2
-
http://www.securityfocus.com/bid/10701
phpBB Viewtopic.PHP PHP Script Injection Vulnerability
Products affected by CVE-2004-1315
- cpe:2.3:a:phpbb_group:phpbb:*:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0_beta1:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0_rc4:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.6c:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.8a:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.7a:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.6d:*:*:*:*:*:*:*
- cpe:2.3:a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*