ID CVE-2007-2481
Summary PHP remote file inclusion vulnerability in wordtube-button.php in the wordTube 1.43 and earlier plugin for WordPress, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the wpPATH parameter.
References
Vulnerable Configurations
  • cpe:2.3:a:ruben_boelinger:wordtube:1.43
    cpe:2.3:a:ruben_boelinger:wordtube:1.43
CVSS
Base: 6.8 (as of 04-05-2007 - 09:46)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
description Wordpress plugin wordTube <= 1.43 (wpPATH) RFI Vulnerability. CVE-2007-2481,CVE-2007-2482. Webapps exploit for php platform
file exploits/php/webapps/3825.txt
id EDB-ID:3825
last seen 2016-01-31
modified 2007-05-01
platform php
port
published 2007-05-01
reporter K-159
source https://www.exploit-db.com/download/3825/
title WordPress plugin wordTube <= 1.43 - wpPATH RFI Vulnerability
type webapps
refmap via4
bid 23737
bugtraq 20070502 [ECHO_ADV_81$2007] wordpress plugins wordTube <= 1.43 (wpPATH) Remote File Inclusion Vulnerability
confirm http://alexrabe.boelinger.com/
misc http://advisories.echo.or.id/adv/adv81-K-159-2007.txt
osvdb 34358
secunia 25074
sreason 2660
vupen ADV-2007-1615
xf wordtube-wordtube-file-include(33996)
Last major update 30-10-2012 - 22:34
Published 03-05-2007 - 13:19
Last modified 16-10-2018 - 12:44
Back to Top