Direct static code injection vulnerability in util.php in the NukeAI 0.0.3 Beta module for PHP-Nuke, aka Program E is an AIML chatterbot, allows remote attackers to upload and execute arbitrary PHP code via a filename with a .php extension in the filename parameter and code in the moreinfo parameter, which is saved to a filename under descriptions/, which is accessible via a direct request.
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/21284 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44729 - | |
References | () https://www.exploit-db.com/exploits/2843 - |
Information
Published : 2006-12-04 11:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6255
Mitre link : CVE-2006-6255
CVE.ORG link : CVE-2006-6255
JSON object : View
Products Affected
nukeai
- nukeai
CWE