Vulnerability Details : CVE-2010-2677
PHP remote file inclusion vulnerability in mw_plugin.php in Open Web Analytics (OWA) 1.2.3, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the IP parameter. NOTE: some of these details are obtained from third party information.
Vulnerability category: File inclusion
Exploit prediction scoring system (EPSS) score for CVE-2010-2677
Probability of exploitation activity in the next 30 days: 2.80%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2677
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
CWE ids for CVE-2010-2677
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2010-2677
-
openwebanalytics 2010-07-13This issue was resolved in version 1.2.4. The solution is to upgrade to that version.
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/57241
Open Web Analytics mw_plugin.php file include CVE-2010-2677 Vulnerability Report
-
http://www.openwebanalytics.com/?p=87
OWA 1.2.4 is available – security update « Open Web AnalyticsPatch;Vendor Advisory
-
http://www.exploit-db.com/exploits/11903
Open Web Analytics 1.2.3 - Multiple File Inclusions - PHP webapps ExploitExploit
-
http://www.ITSecTeam.com/en/vulnerabilities/vulnerability26.htm
Exploit
-
http://packetstormsecurity.org/1003-exploits/owa123-lfirfi.txt
Files ≈ Packet StormExploit
- cpe:2.3:a:openwebanalytics:open_web_analytics:1.2.3:*:*:*:*:*:*:*