2024-12-08 03:06:42 +00:00

130 lines
4.3 KiB
JSON

{
"id": "CVE-2007-4485",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-08-22T23:17:00.000",
"lastModified": "2024-11-21T00:35:42.547",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHP remote file inclusion vulnerability in visitor.php in Butterfly online visitors counter 1.08, when used with certain older versions of PHP with improper SERVER superglobal handling, allows remote attackers to execute arbitrary PHP code via a URL in the _SERVER[DOCUMENT_ROOT] parameter. NOTE: it could be argued that this vulnerability is caused by a problem in PHP and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in Butterfly online visitors counter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en visitor.php de Butterfly online visitors counter 1.08, al ser utilizado con ciertas versiones antiguas de PHP que no manejan adecuadamente la superglobal SERVER, permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante un URL en el par\u00e1metro _SERVER[DOCUMENT_ROOT]. NOTA: se podr\u00eda argumentar que esta vulnerabilidad es causada por un problema en PHP y el parche adecuado deber\u00eda estar en PHP; en este caso, entonces no deber\u00eda tratarse como una vulnerabilidad en Butterfly online visitors counter."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:butterfly:butterfly:1.08:*:*:*:*:*:*:*",
"matchCriteriaId": "D759E359-E8FF-4271-A607-2D4C96E8107A"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/38327",
"source": "cve@mitre.org"
},
{
"url": "http://securityvulns.com/Rdocument845.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://securityvulns.com/source26994.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/477253/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36147",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/38327",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securityvulns.com/Rdocument845.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://securityvulns.com/source26994.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/477253/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36147",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}