ID CVE-2007-1639
Summary Unrestricted file upload vulnerability in PHProjekt 5.2.0, when magic_quotes_gpc is disabled, allows remote authenticated users to upload and execute arbitrary PHP code via a file with an executable extension, which is then accessed by the (1) calendar or (2) file management module, or possibly unspecified other files. Successful exploitation requires that variable "magic_quotes_gpc" is disabled. Upgrade to version 5.2.1.
References
Vulnerable Configurations
  • cpe:2.3:a:phpprojekt:phpprojekt:5.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:phpprojekt:phpprojekt:5.2.0:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 16-10-2018 - 16:39)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:S/C:P/I:P/A:P
refmap via4
bid 22956
bugtraq 20070314 n.runs-SA-2007.006 - PHProjekt 5.2.0 - Privilege escalation
confirm http://www.phprojekt.com/index.php?name=News&file=article&sid=276
gentoo GLSA-200706-07
misc http://www.nruns.de/security_advisory_phprojekt_privilege_escalation.php
osvdb 35163
secunia
  • 24509
  • 25748
sreason 2476
xf phprojekt-calendarfile-file-upload(32995)
Last major update 16-10-2018 - 16:39
Published 23-03-2007 - 23:19
Last modified 16-10-2018 - 16:39
Back to Top