Vulnerability Description
PHP remote file inclusion vulnerability in search.php in Maian Search 1.1 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. NOTE: this issue was disputed by a third party researcher, but confirmed by the vendor, stating "this issue was fixed last year and [no] is longer a problem."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Maian | Search | 1.1 |
References
- http://archives.neohapsis.com/archives/bugtraq/2007-04/0244.html
- http://attrition.org/pipermail/vim/2007-April/001524.htmlExploit
- http://www.osvdb.org/34150
- http://www.securityfocus.com/archive/1/465731/100/0/threaded
- http://www.securityfocus.com/archive/1/465857/100/0/threaded
- http://archives.neohapsis.com/archives/bugtraq/2007-04/0244.html
- http://attrition.org/pipermail/vim/2007-April/001524.htmlExploit
- http://www.osvdb.org/34150
- http://www.securityfocus.com/archive/1/465731/100/0/threaded
- http://www.securityfocus.com/archive/1/465857/100/0/threaded
FAQ
What is CVE-2007-2077?
CVE-2007-2077 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in search.php in Maian Search 1.1 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. NOTE: this issue was dispute...
How severe is CVE-2007-2077?
CVE-2007-2077 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2077?
Check the references section above for vendor advisories and patch information. Affected products include: Maian Search.