Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2007-5071
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Incomplete blacklist vulnerability in upload_img_cgi.php in Simple PHP Blog before 0.5.1 allows remote attackers to upload dangerous files and execute arbitrary code, as demonstrated by a filename ending in .php. or a .htaccess file, a different vector than CVE-2005-2733. NOTE: the vulnerability was also present in a 0.5.1 download available in the early morning of 20070923. NOTE: the original 20070920 disclosure provided an incorrect filename, img_upload_cgi.php..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:alexander_palmo:simple_php_blog:*:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.simplephpblog.com/comments.php?y=07&m=09&entry=entry070923-004446
- http://www.simplephpblog.com/index.php?m=09&y=07
- http://www.securityfocus.com/bid/25747
- http://www.securenetwork.it/ricerca/advisory/download/SN-2007-03.txt
- http://secunia.com/advisories/26968
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36785
- http://www.securityfocus.com/archive/1/480569/100/0/threaded
- http://www.securityfocus.com/archive/1/480092/100/0/threaded