CVE-2007-5423
TikiWiki 1.9.8 - Remote PHP Injection
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
4
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
tiki-graph_formula.php in TikiWiki 1.9.8 allows remote attackers to execute arbitrary code via PHP sequences in the f array parameter, which are processed by create_function.
El archivo tiki-graph_formula.php en TikiWiki versión 1.9.8, permite a atacantes remotos ejecutar código arbitrario por medio de secuencias PHP en el parámetro array f, que son procesadas mediante create_function.
TikiWiki versions 1.9.8 and below contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to 'tiki-graph_formula.php' script not properly sanitizing user input supplied to the f variable, which may allow a remote attacker to execute arbitrary PHP commands resulting in a loss of integrity.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-10-12 CVE Reserved
- 2007-10-12 CVE Published
- 2010-09-20 First Exploit
- 2024-08-07 CVE Updated
- 2024-10-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://bugs.gentoo.org/show_bug.cgi?id=195503 | X_refsource_misc | |
http://osvdb.org/40478 | Vdb Entry | |
http://secunia.com/advisories/27190 | Third Party Advisory | |
http://secunia.com/advisories/27344 | Third Party Advisory | |
http://securityreason.com/securityalert/3216 | Third Party Advisory | |
http://sourceforge.net/forum/forum.php?forum_id=744898 | X_refsource_confirm | |
http://sourceforge.net/project/shownotes.php?release_id=546283&group_id=64258 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/482006/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/482128/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2007/3492 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37076 | Vdb Entry | |
- |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/4509 | 2024-08-07 | |
https://www.exploit-db.com/exploits/16911 | 2010-09-20 | |
http://securityvulns.ru/Sdocument162.html | 2024-08-07 | |
http://www.securityfocus.com/bid/26006 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.gentoo.org/security/en/glsa/glsa-200710-21.xml | 2018-10-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tiki Search vendor "Tiki" | Tikiwiki Cms\/groupware Search vendor "Tiki" for product "Tikiwiki Cms\/groupware" | 1.9.8 Search vendor "Tiki" for product "Tikiwiki Cms\/groupware" and version "1.9.8" | - |
Affected
|