CVE-2007-6485
Oreon 1.4 / Centreon 1.4.1 - Multiple Remote File Inclusion Vulnerabilities
Severity Score
9.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple PHP remote file inclusion vulnerabilities in Centreon 1.4.1 (aka Oreon 1.4) allow remote attackers to execute arbitrary PHP code via a URL in the fileOreonConf parameter to (1) MakeXML.php or (2) MakeXML4statusCounter.php in include/monitoring/engine/.
Múltiples vulnerabilidades de inclusión remota de archivo en PHP en Centreon 1.4.1 (también conocido como Oreon 1.4) permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro fileOreonConf en (1) MakeXML.php o (2) MakeXML4statusCounter.php en include/monitoring/engine/.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-12-20 CVE Reserved
- 2007-12-20 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/28112 | Third Party Advisory | |
http://securityreason.com/securityalert/3472 | Third Party Advisory | |
http://www.osvdb.org/39226 | Vdb Entry | |
http://www.osvdb.org/39227 | Vdb Entry | |
http://www.securityfocus.com/archive/1/485152/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39065 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/4735 | 2024-08-07 | |
http://www.securityfocus.com/bid/26883 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|