PHP remote file inclusion vulnerability in search.php in Maian Search 1.1 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. NOTE: this issue was disputed by a third party researcher, but confirmed by the vendor, stating "this issue was fixed last year and [no] is longer a problem."
References
Configurations
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2007-04/0244.html - | |
References | () http://attrition.org/pipermail/vim/2007-April/001524.html - Exploit | |
References | () http://www.osvdb.org/34150 - | |
References | () http://www.securityfocus.com/archive/1/465731/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/465857/100/0/threaded - |
Information
Published : 2007-04-18 03:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-2077
Mitre link : CVE-2007-2077
CVE.ORG link : CVE-2007-2077
JSON object : View
Products Affected
maian
- search
CWE