Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in File Uploader 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter to (1) index.php or (2) datei.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mapos Scripts | File Uploader | 1.1 |
References
- http://osvdb.org/36424
- http://osvdb.org/36425
- http://secunia.com/advisories/26397
- http://securityreason.com/securityalert/3000
- http://www.securityfocus.com/archive/1/475957/100/0/threaded
- http://www.securityfocus.com/bid/25253Exploit
- http://www.vupen.com/english/advisories/2007/2832
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35926
- http://osvdb.org/36424
- http://osvdb.org/36425
- http://secunia.com/advisories/26397
- http://securityreason.com/securityalert/3000
- http://www.securityfocus.com/archive/1/475957/100/0/threaded
- http://www.securityfocus.com/bid/25253Exploit
- http://www.vupen.com/english/advisories/2007/2832
FAQ
What is CVE-2007-4327?
CVE-2007-4327 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Multiple PHP remote file inclusion vulnerabilities in File Uploader 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter to (1) index.php or (2) date...
How severe is CVE-2007-4327?
CVE-2007-4327 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4327?
Check the references section above for vendor advisories and patch information. Affected products include: Mapos Scripts File Uploader.