CVE-2007-2988

Current Description

A certain admin script in Inout Meta Search Engine sends a redirect to the web browser but does not exit when administrative credentials are missing, which allows remote attackers to inject arbitrary PHP code, as demonstrated by a request to admin/create_engine.php followed by a request to admin/generate_tabs.php.

Basic Data

PublishedJune 01, 2007
Last ModifiedOctober 16, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationInout ScriptsInout Meta Search Engine********

Vulnerable Software List

VendorProductVersions
Inout Scripts Inout Meta Search Engine *

References

NameSourceURLTags
42034http://osvdb.org/42034OSVDB
2763http://securityreason.com/securityalert/2763SREASON
20070528 Inout Meta Searh engine Remote Code Executionhttp://www.securityfocus.com/archive/1/469808/100/0/threadedBUGTRAQ
24189http://www.securityfocus.com/bid/24189BID
24199http://www.securityfocus.com/bid/24199BID
inout-searchengine-create-code-execution(34563)https://exchange.xforce.ibmcloud.com/vulnerabilities/34563XF
4004https://www.exploit-db.com/exploits/4004EXPLOIT-DB