PHP File Inclusion Vulnerability in phpWebNotes 2.0.0 via extract() Function

PHP File Inclusion Vulnerability in phpWebNotes 2.0.0 via extract() Function

CVE-2005-2775 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.

Learn more about our Web App Pen Testing.