Vulnerability Description
PHP remote file inclusion vulnerability in index.php in Agares Media Arcadem 2.01 allows remote attackers to execute arbitrary PHP code via a URL in the loadpage parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Agares Media | Arcadem | 2.0.1 |
Related Weaknesses (CWE)
References
- http://14house.blogspot.com/2007/08/arcadem-rfi-sql-injection-flaws.html
- http://forums.agaresmedia.com/viewtopic.php?f=13&t=19
- http://osvdb.org/36856
- http://secunia.com/advisories/26574PatchVendor Advisory
- http://www.securityfocus.com/bid/25432Exploit
- http://14house.blogspot.com/2007/08/arcadem-rfi-sql-injection-flaws.html
- http://forums.agaresmedia.com/viewtopic.php?f=13&t=19
- http://osvdb.org/36856
- http://secunia.com/advisories/26574PatchVendor Advisory
- http://www.securityfocus.com/bid/25432Exploit
FAQ
What is CVE-2007-4551?
CVE-2007-4551 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in index.php in Agares Media Arcadem 2.01 allows remote attackers to execute arbitrary PHP code via a URL in the loadpage parameter.
How severe is CVE-2007-4551?
CVE-2007-4551 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4551?
Check the references section above for vendor advisories and patch information. Affected products include: Agares Media Arcadem.