{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2007-0486", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in Openads (aka phpAdsNew) 2.0.7 allow remote attackers to execute arbitrary PHP code via a URL in the (1) phpAds_geoPlugin parameter to libraries/lib-remotehost.inc, the (2) filename parameter to admin/report-index, or the (3) phpAds_config[my_footer] parameter to admin/lib-gui.inc. NOTE: the vendor has disputed this issue, stating that the relevant variables are used within function definitions." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20070120 phpAdsNew 2.0.7 Remote File Include", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/457670/100/0/threaded" }, { "name" : "20070122 Re: phpAdsNew 2.0.7 Remote File Include", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/457806/100/200/threaded" }, { "name" : "20070124 Re: phpAdsNew 2.0.7 Remote File Include", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/457991/100/200/threaded" }, { "name" : "22172", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/22172" }, { "name" : "33573", "refsource" : "OSVDB", "url" : "http://osvdb.org/33573" }, { "name" : "2174", "refsource" : "SREASON", "url" : "http://securityreason.com/securityalert/2174" } ] } }