Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL network
care2x
exploit available
Published: 2007-03-14
Updated: 2018-10-16
Summary
Multiple PHP remote file inclusion vulnerabilities in CARE2X 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) inc_checkdate_lang.php, (2) inc_charset_fx.php, (3) inc_config_color.php, (4) inc_currency_set.php, (5) inc_db_makelink.php, (6) inc_diagnostics_report_fx.php, (7) inc_environment_global.php, (8) inc_front_chain_lang.php, (9) inc_init_crypt.php, (10) inc_load_copyrite.php, or (11) inc_news_save.php in include/; (12) diagnostics-report-index.php, (13) config_options_mascot.php, (14) barcode-labels.php, (15) chg-color.php, or (16) config_options_gui_template.php in main/; or unspecified other files.
Vulnerable Configurations
Part | Description | Count |
Application | Care2X | 1 |
Exploit-Db
description | CARE2X 1.1 (root_path) Remote File Inclusion Vulnerability. CVE-2007-1458. Webapps exploit for php platform |
id | EDB-ID:3472 |
last seen | 2016-01-31 |
modified | 2007-03-13 |
published | 2007-03-13 |
reporter | the_day |
source | https://www.exploit-db.com/download/3472/ |
title | CARE2X 1.1 root_path Remote File Inclusion Vulnerability |