NVD Vulnerability Detail
Search Exploit, PoC
CVE-2007-0831
Summary

Multiple PHP remote file inclusion vulnerabilities in Atsphp 5.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the CONF[path] parameter to (1) index.php, (2) sources/usercp.php, or (3) sources/admin.php. NOTE: Another researcher has disputed this vulnerability, noting that CONF[path] is defined before use in index.php, that CONF[path] inclusion cannot occur through a direct request to other affected files, and that usercp.php is a typo of user_cp.php

Publication Date Feb. 8, 2007, 7:28 a.m.
Registration Date Jan. 29, 2021, 2:06 p.m.
Last Update Aug. 7, 2024, 10:15 p.m.
CVSS2.0 : HIGH
Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges はい
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:atsphp:atsphp:5.0.1:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
atsphp におけるコードインジェクションの脆弱性
Title atsphp におけるコードインジェクションの脆弱性
Summary

atsphp には、コードインジェクションの脆弱性が存在します。

Possible impacts
Solution

参考情報を参照して適切な対策を実施してください。

Publication Date Feb. 7, 2007, midnight
Registration Date July 19, 2024, 6:28 p.m.
Last Update July 19, 2024, 6:28 p.m.
Affected System
atsphp
atsphp 5.0.1
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
その他
Change Log
No Changed Details Date of change
1 [2024年07月19日]   掲載 July 19, 2024, 6:09 p.m.