{ "schema_version": "1.4.0", "id": "GHSA-wgxc-xgrr-4f53", "modified": "2022-04-29T03:00:41Z", "published": "2022-04-29T03:00:41Z", "aliases": [ "CVE-2004-2044" ], "details": "PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the \"admin.php\" string.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-2044" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16294" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16296" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16297" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16298" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=108611606320559&w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=108611643614881&w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=108662955105757&w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/11766" }, { "type": "WEB", "url": "http://www.osvdb.org/6593" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/10447" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2004-06-01T04:00:00Z" } }