Vulnerabilities > CVE-2007-1639 - Unspecified vulnerability in PHPprojekt 5.2.0
Attack vector
NETWORK Attack complexity
HIGH Privileges required
SINGLE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Unrestricted file upload vulnerability in PHProjekt 5.2.0, when magic_quotes_gpc is disabled, allows remote authenticated users to upload and execute arbitrary PHP code via a file with an executable extension, which is then accessed by the (1) calendar or (2) file management module, or possibly unspecified other files. Successful exploitation requires that variable "magic_quotes_gpc" is disabled. Upgrade to version 5.2.1.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200706-07.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200706-07 (PHProjekt: Multiple vulnerabilities) Alexios Fakos from n.runs AG has discovered multiple vulnerabilities in PHProjekt, including the execution of arbitrary SQL commands using unknown vectors (CVE-2007-1575), the execution of arbitrary PHP code using an unrestricted file upload (CVE-2007-1639), cross-site request forgeries using different modules (CVE-2007-1638), and a cross-site scripting attack using unkown vectors (CVE-2007-1576). Impact : An authenticated user could elevate their privileges by exploiting the vulnerabilities described above. Note that the magic_quotes_gpc PHP configuration setting must be set to |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25562 |
published | 2007-06-21 |
reporter | This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25562 |
title | GLSA-200706-07 : PHProjekt: Multiple vulnerabilities |
code |
|
References
- http://osvdb.org/35163
- http://secunia.com/advisories/24509
- http://secunia.com/advisories/25748
- http://security.gentoo.org/glsa/glsa-200706-07.xml
- http://securityreason.com/securityalert/2476
- http://www.nruns.de/security_advisory_phprojekt_privilege_escalation.php
- http://www.phprojekt.com/index.php?name=News&file=article&sid=276
- http://www.securityfocus.com/archive/1/462785/100/100/threaded
- http://www.securityfocus.com/bid/22956
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32995