First published: Tue Mar 20 2007(Updated: )
The cross-site request forgery (CSRF) protection in PHP-Nuke 8.0 and earlier does not ensure the SERVER superglobal is an array before validating the HTTP_REFERER, which allows remote attackers to conduct CSRF attacks.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | <=8.0 | |
PHP-Nuke | =5.6 | |
PHP-Nuke | =6.5 | |
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.1 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.3 | |
PHP-Nuke | =7.4 | |
PHP-Nuke | =7.5 | |
PHP-Nuke | =7.6 | |
PHP-Nuke | =7.7 | |
PHP-Nuke | =7.8 | |
PHP-Nuke | =7.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1520 is considered a high severity vulnerability due to its potential for CSRF attacks.
To fix CVE-2007-1520, upgrade PHP-Nuke to a version later than 8.0 to ensure proper CSRF protection.
CVE-2007-1520 affects PHP-Nuke versions 8.0 and earlier.
CVE-2007-1520 is a cross-site request forgery (CSRF) vulnerability.
Yes, CVE-2007-1520 can be exploited remotely by attackers to perform CSRF attacks.