{ "id": "CVE-2007-5453", "sourceIdentifier": "cve@mitre.org", "published": "2007-10-14T18:17:00.000", "lastModified": "2024-11-21T00:37:55.810", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Multiple eval injection vulnerabilities in Php-Stats 0.1.9.2 allow remote authenticated administrators to execute arbitrary code by writing PHP sequences to the php-stats-options record in the _options table, which is used in an eval function call by (1) admin.php, (2) click.php, (3) download.php, and unspecified other files, as demonstrated by modifying _options through a backup restore action in admin.php." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n de evaluaci\u00f3n en Php-Stats 0.1.9.2 permiten a administradores remotos autenticados ejecutar c\u00f3digo de su elecci\u00f3n al escribir secuencias PHP en el registro php-stats-options en la tabla _options, que se usa en una llamada a funci\u00f3n eval por (1) admin.php, (2) click.php, (3) download.php, y otros ficheros no especificados, como se demuestra modificando _options a trav\u00e9s de una acci\u00f3n de recuperaci\u00f3n de copia de seguridad en admin.php." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-94" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:php-stats:php-stats:0.1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "60C5EA8E-89BD-491B-AA76-68E601FCECA2" } ] } ] } ], "references": [ { "url": "http://osvdb.org/43480", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/26022", "source": "cve@mitre.org" }, { "url": "https://www.exploit-db.com/exploits/4513", "source": "cve@mitre.org" }, { "url": "http://osvdb.org/43480", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/26022", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://www.exploit-db.com/exploits/4513", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }