CVE-2007-1790 (CNNVD-200703-706)

MEDIUM 有利用代码
中文标题:
Kaqoo Auction Install_Root 多个远程文件包含漏洞
英文标题:
Multiple PHP remote file inclusion vulnerabilities in Kaqoo Auction Software Free Edition allow remo...
CVSS分数: 6.8
发布时间: 2007-03-31 10:00:00
漏洞类型: 代码注入
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v4
漏洞描述
中文描述:

Kaqoo Auction Software免费版中存在多个PHP远程文件包含漏洞。远程攻击者可以借助提交到include/core/中的(1)support.inc.php,(2) function.inc.php,(3)rdal_object.inc.php,(4)rdal_editor.inc.php.(5)login.inc.php,(6)request.inc.php和(7)categories.inc.php;include/display/item/中的(8)save.inc.php,(9)preview.inc.php,(10)edit_item.inc.php,(11)new_item.inc.php和(12)item_info.inc.php;include/display/中的(13)search.inc.php,(14)item_edit.inc.php,(15)register_succsess.inc.php,(16)context_menu.inc.php,(17) item_repost.inc.php,(18)balance.inc.php,(19)featured.inc.php,(20)user.inc.php,(21)buynow.inc.php,(22)install_complete.inc.php,(23) fees_info.inc.php, (24) user_feedback.inc.php, (25) admin_balance.inc.php, (26) activate.inc.php, (27) user_info.inc.php, (28) member.inc.php,(29)add_bid.inc.php,(30)items_filter.inc.php,(31)my_info.inc.php,(32)register.inc.php,(33)leave_feedback.inc.php和(34) user_auctions.inc.php;include/中的(35)design/form.inc.php,(36)processor.inc.php,(37)interfaces.inc.php,(38)left_menu.inc.php,(39) login.inc.php和(40)categories.inc.php的install_root 参数中的一个URL,执行任意的PHP代码。

英文描述:

Multiple PHP remote file inclusion vulnerabilities in Kaqoo Auction Software Free Edition allow remote attackers to execute arbitrary PHP code via a URL in the install_root parameter to (1) support.inc.php, (2) function.inc.php, (3) rdal_object.inc.php, (4) rdal_editor.inc.php. (5) login.inc.php, (6) request.inc.php, and (7) categories.inc.php in include/core/; (8) save.inc.php, (9) preview.inc.php, (10) edit_item.inc.php, (11) new_item.inc.php, and (12) item_info.inc.php in include/display/item/; (13) search.inc.php, (14) item_edit.inc.php, (15) register_succsess.inc.php, (16) context_menu.inc.php, (17) item_repost.inc.php, (18) balance.inc.php, (19) featured.inc.php, (20) user.inc.php, (21) buynow.inc.php, (22) install_complete.inc.php, (23) fees_info.inc.php, (24) user_feedback.inc.php, (25) admin_balance.inc.php, (26) activate.inc.php, (27) user_info.inc.php, (28) member.inc.php, (29) add_bid.inc.php, (30) items_filter.inc.php, (31) my_info.inc.php, (32) register.inc.php, (33) leave_feedback.inc.php, and (34) user_auctions.inc.php in include/display/; and (35) design/form.inc.php, (36) processor.inc.php, (37) interfaces.inc.php (38) left_menu.inc.php, (39) login.inc.php, and (40) categories.inc.php in include/.

CWE类型:
CWE-94
标签:
webapps php ThE dE@Th OSVDB-34584 OSVDB-34583 OSVDB-34582 OSVDB-34581 OSVDB-34580 OSVDB-34579 OSVDB-34578 OSVDB-34577 OSVDB-34576 OSVDB-34575 OSVDB-34574 OSVDB-34573 OSVDB-34572 OSVDB-34571 OSVDB-34570 OSVDB-34569 OSVDB-34568 OSVDB-34567 OSVDB-34566 OSVDB-34565 OSVDB-34564 OSVDB-34563 OSVDB-34562 OSVDB-34561 OSVDB-34560 OSVDB-34559 OSVDB-34558 OSVDB-34557 OSVDB-34556 OSVDB-34555 OSVDB-34554 OSVDB-34553 OSVDB-34552 OSVDB-34551 OSVDB-34550 OSVDB-34549 OSVDB-34548 OSVDB-34547 OSVDB-34546 OSVDB-34545
受影响产品
厂商 产品 版本 版本范围 平台 CPE
kaqoo kaqoo_auction_software * - - cpe:2.3:a:kaqoo:kaqoo_auction_software:*:*:free:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
34582 vdb-entry
cve.org
访问
ADV-2007-1180 vdb-entry
cve.org
访问
34551 vdb-entry
cve.org
访问
34548 vdb-entry
cve.org
访问
34558 vdb-entry
cve.org
访问
34572 vdb-entry
cve.org
访问
34578 vdb-entry
cve.org
访问
34553 vdb-entry
cve.org
访问
34573 vdb-entry
cve.org
访问
34584 vdb-entry
cve.org
访问
34564 vdb-entry
cve.org
访问
3607 exploit
cve.org
访问
34556 vdb-entry
cve.org
访问
34575 vdb-entry
cve.org
访问
34568 vdb-entry
cve.org
访问
34554 vdb-entry
cve.org
访问
34563 vdb-entry
cve.org
访问
34571 vdb-entry
cve.org
访问
34570 vdb-entry
cve.org
访问
34560 vdb-entry
cve.org
访问
34557 vdb-entry
cve.org
访问
34583 vdb-entry
cve.org
访问
34547 vdb-entry
cve.org
访问
34552 vdb-entry
cve.org
访问
34545 vdb-entry
cve.org
访问
34561 vdb-entry
cve.org
访问
34581 vdb-entry
cve.org
访问
34580 vdb-entry
cve.org
访问
34567 vdb-entry
cve.org
访问
kaqoo-installroot-file-include(33335) vdb-entry
cve.org
访问
34579 vdb-entry
cve.org
访问
34569 vdb-entry
cve.org
访问
34559 vdb-entry
cve.org
访问
34576 vdb-entry
cve.org
访问
34550 vdb-entry
cve.org
访问
34577 vdb-entry
cve.org
访问
24696 third-party-advisory
cve.org
访问
34549 vdb-entry
cve.org
访问
34566 vdb-entry
cve.org
访问
34574 vdb-entry
cve.org
访问
34562 vdb-entry
cve.org
访问
23211 vdb-entry
cve.org
访问
34565 vdb-entry
cve.org
访问
34555 vdb-entry
cve.org
访问
34546 vdb-entry
cve.org
访问
Download Exploit EDB-3607 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2007-1790 ADVISORY
cve.org
访问
CVSS评分详情
6.8
MEDIUM
CVSS向量: AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2007-03-31 10:00:00
修改时间:
2024-08-07 13:06:26
创建时间:
2025-11-11 15:32:42
更新时间:
2026-01-26 02:17:31
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2007-1790 2025-11-11 15:17:51 2025-11-11 07:32:42
NVD nvd_CVE-2007-1790 2025-11-11 14:52:09 2025-11-11 07:41:28
CNNVD cnnvd_CNNVD-200703-706 2025-11-11 15:08:56 2025-11-11 07:49:16
EXPLOITDB exploitdb_EDB-3607 2025-11-11 15:05:37 2025-11-11 08:32:41
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:32:41
references_count: 45 → 47; tags_count: 0 → 43; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 45 -> 47
  • tags_count: 0 -> 43
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:16
vulnerability_type: 未提取 → 代码注入; cnnvd_id: 未提取 → CNNVD-200703-706; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 代码注入
  • cnnvd_id: 未提取 -> CNNVD-200703-706
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:28
cvss_score: 未提取 → 6.8; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 1; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 6.8
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 1
  • data_sources: ['cve'] -> ['cve', 'nvd']