fkie_cve-2007-1032
Vulnerability from fkie_nvd
Published
2007-02-21 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in phpMyFAQ 1.6.9 and earlier, when register_globals is enabled, allows remote attackers to "gain the privilege for uploading files on the server."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*", "matchCriteriaId": "1394509F-1694-4C1D-8D12-E75E72DFD733", "versionEndIncluding": "1.6.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.60:*:*:*:*:*:*:*", "matchCriteriaId": "5B26F173-5AB9-482C-8B3F-6424359E7062", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.65:*:*:*:*:*:*:*", "matchCriteriaId": "A4D99DCE-969E-4E2C-8557-DF19F43F7388", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "C1833515-70CA-4B10-A947-5F8E544DA110", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "39A1B3D0-67F3-4F88-9952-D70CD86387B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.80a:*:*:*:*:*:*:*", "matchCriteriaId": "5E802239-AE7E-4C17-A98C-8E685E77B5B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.85:*:*:*:*:*:*:*", "matchCriteriaId": "9E54ADFE-3386-41BC-B08B-DAE967327B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.86:*:*:*:*:*:*:*", "matchCriteriaId": "70079FB1-278D-49A2-8211-E68B7F5F626D", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.87:*:*:*:*:*:*:*", "matchCriteriaId": "20020044-2E57-4789-AB98-1B113D523BB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.90:*:*:*:*:*:*:*", "matchCriteriaId": "5D5BB764-1B6F-433F-90A4-8103610E8F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "DA60DB45-5CFB-4EB2-ACD7-784B1905F259", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:0.666:*:*:*:*:*:*:*", "matchCriteriaId": "DBA9BBDE-97D0-4B30-AEBB-69A302630542", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "99738346-9DC0-4B8B-8FFC-6A966E45148E", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1BC6F3CC-2440-4701-9CCC-47FD1B84F9B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.0.1a:*:*:*:*:*:*:*", "matchCriteriaId": "1C67BA38-E7BE-471F-9785-89C625C77792", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "153DCD21-CF93-47F7-ABBA-D6911DC2CAF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E41AAC1B-6768-48E3-87F8-07EC5569B010", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "344819F5-FBFB-4A1F-BDD8-5810E971B096", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FA0455C3-04D5-4C0E-A208-A118D156887F", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E3BB1EC6-C14A-4ECC-B9A6-C7669A5491AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.1.4a:*:*:*:*:*:*:*", "matchCriteriaId": "BC6AE5E8-199F-4412-A119-FA5C1E7A9AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "72072594-4865-4887-86DA-CFA0016C9377", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF373EBB-79A9-408D-A165-F77621432FB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC28624F-5720-4CA3-9A46-4FD068C3EF3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "39D5BD6D-2BE5-4D41-89CB-C75BAF31CEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "D1A6F367-786B-4724-8640-FEAF614CDC88", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C85053E4-DE47-4A1F-B575-DD7911832C02", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "223AA20B-677D-4B73-B154-1E4AA3174A87", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.2.5a:*:*:*:*:*:*:*", "matchCriteriaId": "EF0C9783-6ED4-4B79-AE6C-F76482E47325", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.2.5b:*:*:*:*:*:*:*", "matchCriteriaId": "8EB38F0F-C826-4B76-B736-E35BB9FD6662", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "06A50C4E-05E0-42A3-BD6D-0A94A63A4C35", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "8C8D49BE-0858-4668-A6EA-537CDE4717FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "64F62405-EA47-4061-BD0B-063EA4E3CED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "456DC767-E09C-4E7F-9B48-EDD869EF7EFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "0C0187F0-200A-4E51-BCED-9A30C339022B", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "89E2D6B3-B087-4413-8C40-CEEEA6001194", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "EBC40AA1-5EC8-4184-973B-C91E706B84A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "A3906A68-5C05-4D8F-84B8-C1E4C4E69D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "A77FFE78-0BA2-44F8-A84D-634060A7B471", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "0DD06BF1-A3ED-4E87-9E07-71746B98D456", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.9pl1:*:*:*:*:*:*:*", "matchCriteriaId": "EBC2D031-6C8C-49A2-AF52-7C5FE83989B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "653DA520-718F-4327-B822-1A6E54427BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "7F8C52FB-D19D-4BA1-990A-AB4ED2E59EF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "4A956F61-5116-4F9B-BD3E-F933F104F0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "C6B24AFF-1FAE-45C1-8983-D1B6ECC699A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "8E7E151B-F894-4141-AE91-DEF3C3DBF226", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "60CA0AB0-D9AE-463E-9D1B-E13B2F7B66DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.0a:*:*:*:*:*:*:*", "matchCriteriaId": "89C9118F-6DD1-4606-BAB4-24DB619579EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7FEEA6B3-2F0A-4A5E-91C6-054B40C0CE5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC4334A3-FB00-4493-98BE-406374E2CAB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A7C7BADC-3CCC-453E-A86F-487EC9B507AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "91A4FBAF-66FD-40C9-8C23-94813B43CE7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "7F1E2225-7B74-4142-85CF-BA0053C8717F", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "711ED6E4-67FB-484C-BEC7-0BB4E0EAD481", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "F01B0D69-34D9-4CE5-B42A-38312075D370", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "FA8FD2B5-400B-4A73-984C-D85B507D1B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "765D11EC-EFD1-4F70-A2A3-215A52B0A81D", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "3A55E240-570A-45EE-A61C-05DF93EC28E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "38E0385C-4DE7-4543-A619-34E04F1CFAA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77EE89A-A920-45EF-845F-FE28C620AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E50CE3C-06D9-4543-9966-E277113BAA82", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DDABF09A-D991-4D64-806C-309FBE921B31", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7A47DF5D-6D36-4C47-9CBB-3FDF383D39E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "1981C9F6-1E0B-4E60-8F73-F655DF400975", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "55069115-5799-4566-842C-2ABE0E80E485", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "87B99D2B-D08E-4941-A319-C77FAA624DB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "A950FD89-A758-4260-B3C4-E4BF6144F1D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "FD3BE7E6-AE04-45E8-91CF-7315FE412431", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "49FFDD87-84FD-4659-A637-2BBC36B9E696", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "89138047-5087-4CAD-BC37-5D9C4B52DBC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "57F45FD8-CEE0-472E-96D0-EA4890ABA85C", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "B1E359E0-79B0-4B9F-A340-638E8DC5A0FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "7ACA7EB9-2466-41AB-BEDD-EBE303642A73", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "215166AC-1B68-44E9-9BB6-944097850B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "7136ACF5-6629-45F2-916E-EFE0A8EF45AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "D162F6CF-9517-4882-9181-9275D0CAFC57", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "39E68238-AF1F-4025-9A2A-1B180AF57B21", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "E224C228-2547-4A26-A24C-11D8A1770D12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in phpMyFAQ 1.6.9 and earlier, when register_globals is enabled, allows remote attackers to \"gain the privilege for uploading files on the server.\"" }, { "lang": "es", "value": "Una vulnerabilidad no especificada en phpMyFAQ versi\u00f3n 1.6.9 y anteriores, cuando register_globals est\u00e1 habilitado, permite a atacantes remotos \"gain the privilege for uploading files on the server.\"" } ], "evaluatorImpact": "Successful exploitation requires that \"register_globals\" is enabled.", "id": "CVE-2007-1032", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-21T11:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/32603" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/24230" }, { "source": "cve@mitre.org", "url": "http://www.phpmyfaq.de/advisory_2007-02-18.php" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/32603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/24230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.phpmyfaq.de/advisory_2007-02-18.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32573" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…