ID CVE-2007-2969
Type cve
Reporter cve@mitre.org
Modified 2017-10-11T01:32:00
Description
PHP remote file inclusion vulnerability in newsletter.php in WAnewsletter 2.1.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the waroot parameter.
{"id": "CVE-2007-2969", "bulletinFamily": "NVD", "title": "CVE-2007-2969", "description": "PHP remote file inclusion vulnerability in newsletter.php in WAnewsletter 2.1.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the waroot parameter.", "published": "2007-06-01T01:30:00", "modified": "2017-10-11T01:32:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-2969", "reporter": "cve@mitre.org", "references": ["http://www.securityfocus.com/bid/24177", "https://www.exploit-db.com/exploits/4000", "http://osvdb.org/38812"], "cvelist": ["CVE-2007-2969"], "type": "cve", "lastseen": "2020-12-09T19:26:06", "edition": 5, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:38812"]}, {"type": "exploitdb", "idList": ["EDB-ID:4000"]}, {"type": "canvas", "idList": ["WANEWSLETTER_REMOTE"]}], "modified": "2020-12-09T19:26:06", "rev": 2}, "score": {"value": 7.3, "vector": "NONE", "modified": "2020-12-09T19:26:06", "rev": 2}, "vulnersScore": 7.3}, "cpe": ["cpe:/a:wanewsletter:wanewsletter:2.1.3"], "affectedSoftware": [{"cpeName": "wanewsletter:wanewsletter", "name": "wanewsletter", "operator": "le", "version": "2.1.3"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:wanewsletter:wanewsletter:2.1.3:*:*:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:wanewsletter:wanewsletter:2.1.3:*:*:*:*:*:*:*", "versionEndIncluding": "2.1.3", "vulnerable": true}], "operator": "OR"}]}}
{"osvdb": [{"lastseen": "2017-04-28T13:20:34", "bulletinFamily": "software", "cvelist": ["CVE-2007-2969"], "description": "## Vulnerability Description\nWAnewsletter contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to 'newsletter.php' not properly sanitizing user input supplied to the 'waroot' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nWAnewsletter v2.1.3 newsletter.php waroot Variable Remote File Inclusion\n## Manual Testing Notes\n[Path]/newsletter/newsletter.php?waroot=shell\n## References:\nGeneric Exploit URL: http://www.milw0rm.com/exploits/4000\n[CVE-2007-2969](https://vulners.com/cve/CVE-2007-2969)\nBugtraq ID: 24177\n", "edition": 1, "modified": "2007-05-28T00:00:00", "published": "2007-05-28T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:38812", "id": "OSVDB:38812", "title": "WAnewsletter newsletter.php waroot Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-01-31T19:52:44", "description": "WAnewsletter <= 2.1.3 Remote File Inclusion Vulnerability. CVE-2007-2969. Webapps exploit for php platform", "published": "2007-05-28T00:00:00", "type": "exploitdb", "title": "wanewsletter <= 2.1.3 - Remote File Inclusion Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2007-2969"], "modified": "2007-05-28T00:00:00", "id": "EDB-ID:4000", "href": "https://www.exploit-db.com/exploits/4000/", "sourceData": "======================= S==A==U==D==I ========================\n\nWAnewsletter-2.1.3 (newsletter.php) RFI Vul\n\n==============================================================\n\nFound By : Mogatil , jjl@hotmail.com\n\n==============================================================\n\nScript Site : http://script.emanual.ru/get?i=1053\n\n==============================================================\nFile : /newsletter.php\n\n\nrequire_once($waroot . 'start.php');\n\n==============================================================\n\nThanx: cold zero . gawey Al Azary . crazy man . scorbion_22 .\nthe_muslim_sniper\n\n==============================================================\n\nExploit :[Path]/newsletter/newsletter.php?waroot=shell\n\n==============================================================\n\n# milw0rm.com [2007-05-28]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/4000/"}], "canvas": [{"lastseen": "2019-05-29T17:19:24", "bulletinFamily": "exploit", "cvelist": ["CVE-2007-2969"], "description": "**Name**| WAnewsletter_remote \n---|--- \n**CVE**| CVE-2007-2969 \n**Exploit Pack**| [CANVAS](<http://http://www.immunityinc.com/products-canvas.shtml>) \n**Description**| WAnewsletter \n**Notes**| CVSS: 7.5 \nRepeatability: Infinite \nVENDOR: emanual.ru \nCVE Url: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2969 \nCVE Name: CVE-2007-2969 \n\n", "edition": 2, "modified": "2007-06-01T01:30:00", "published": "2007-06-01T01:30:00", "id": "WANEWSLETTER_REMOTE", "href": "http://exploitlist.immunityinc.com/home/exploitpack/CANVAS/WAnewsletter_remote", "type": "canvas", "title": "Immunity Canvas: WANEWSLETTER_REMOTE", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}