ID CVE-2007-0881
Summary PHP remote file inclusion vulnerability in the Seitenschutz plugin for OPENi-CMS 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the (1) config[oi_dir] and possibly (2) config[openi_dir] parameters to open-admin/plugins/site_protection/index.php. NOTE: vector 2 might be the same as CVE-2006-4750. Successful exploitation requires that "register_globals" is enabled.
References
Vulnerable Configurations
  • cpe:2.3:a:openi-cms_group:openi-cms:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:openi-cms_group:openi-cms:1.0:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 19-10-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 22511
exploit-db 3292
misc http://echo.or.id/adv/adv64-y3dips-2007.txt
osvdb 33175
secunia 24119
vupen ADV-2007-0556
xf internalrange-oidir-file-include(32423)
Last major update 19-10-2017 - 01:30
Published 12-02-2007 - 20:28
Last modified 19-10-2017 - 01:30
Back to Top