Vulnerability Details : CVE-2005-1181
NOTE: this issue has been disputed by the vendor. PHP remote code injection vulnerability in loader.php for Ariadne CMS 2.4 allows remote attackers to execute arbitrary PHP code by modifying the ariadne parameter to reference a URL on a remote web server that contains the code. NOTE: the vendor has disputed this issue, saying that loader.php first requires the "ariadne.inc" file, which defines the $ariadne variable, and thus it cannot be modified by an attacker. In addition, CVE personnel have partially verified the dispute via source code inspection of Ariadne 2.4 as available on July 5, 2005
Exploit prediction scoring system (EPSS) score for CVE-2005-1181
Probability of exploitation activity in the next 30 days: 3.17%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 91 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-1181
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-1181
-
http://www.osvdb.org/15549
404 Not Found
-
http://securitytracker.com/id?1013721
securitytracker.com
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/20611
Vulnerability Report
Products affected by CVE-2005-1181
- cpe:2.3:a:ariadne:ariadne_cms:2.4:*:*:*:*:*:*:*