Vulnerability Description
Direct static code injection vulnerability in wiki/index.php in Bitweaver 2.0.0 and earlier, when comments are enabled, allows remote attackers to inject arbitrary PHP code via an editcomments action.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bitweaver | Bitweaver | <= 2.0.0 |
Related Weaknesses (CWE)
References
- http://osvdb.org/40148
- http://securityreason.com/securityalert/3428
- http://securityreason.com/securityalert/3454
- http://www.hackerscenter.com/archive/view.asp?id=28129Exploit
- http://www.securityfocus.com/archive/1/484805/100/0/threaded
- http://www.securityfocus.com/bid/26801Exploit
- http://osvdb.org/40148
- http://securityreason.com/securityalert/3428
- http://securityreason.com/securityalert/3454
- http://www.hackerscenter.com/archive/view.asp?id=28129Exploit
- http://www.securityfocus.com/archive/1/484805/100/0/threaded
- http://www.securityfocus.com/bid/26801Exploit
FAQ
What is CVE-2007-6412?
CVE-2007-6412 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Direct static code injection vulnerability in wiki/index.php in Bitweaver 2.0.0 and earlier, when comments are enabled, allows remote attackers to inject arbitrary PHP code via an editcomments action.
How severe is CVE-2007-6412?
CVE-2007-6412 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6412?
Check the references section above for vendor advisories and patch information. Affected products include: Bitweaver Bitweaver.