Vulnerabilities > CVE-2007-0881 - Unspecified vulnerability in Openi-Cms Group Openi-Cms 1.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN openi-cms-group
exploit available
Summary
PHP remote file inclusion vulnerability in the Seitenschutz plugin for OPENi-CMS 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the (1) config[oi_dir] and possibly (2) config[openi_dir] parameters to open-admin/plugins/site_protection/index.php. NOTE: vector 2 might be the same as CVE-2006-4750.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | OPENi-CMS Site Protection Plugin Remote File Inclusion Vulnerability. CVE-2007-0881. Webapps exploit for php platform |
file | exploits/php/webapps/3292.txt |
id | EDB-ID:3292 |
last seen | 2016-01-31 |
modified | 2007-02-11 |
platform | php |
port | |
published | 2007-02-11 |
reporter | y3dips |
source | https://www.exploit-db.com/download/3292/ |
title | OPENi-CMS Site Protection Plugin Remote File Inclusion Vulnerability |
type | webapps |
References
- http://echo.or.id/adv/adv64-y3dips-2007.txt
- http://echo.or.id/adv/adv64-y3dips-2007.txt
- http://osvdb.org/33175
- http://osvdb.org/33175
- http://secunia.com/advisories/24119
- http://secunia.com/advisories/24119
- http://www.securityfocus.com/bid/22511
- http://www.securityfocus.com/bid/22511
- http://www.vupen.com/english/advisories/2007/0556
- http://www.vupen.com/english/advisories/2007/0556
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32423
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32423
- https://www.exploit-db.com/exploits/3292
- https://www.exploit-db.com/exploits/3292