### [CVE-2007-4727](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow." ### POC #### Reference - http://securityreason.com/securityalert/3127 - http://www.novell.com/linux/security/advisories/2007_20_sr.html #### Github No PoCs found on GitHub currently.