First published: Thu May 17 2007(Updated: )
PHP remote file inclusion vulnerability in index.php in Achievo 1.1.0 allows remote attackers to execute arbitrary PHP code via a URL in the config_atkroot parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
apple a ux | ||
Apple iOS and macOS | ||
HPE HP-UX | ||
Compaq Tru64 | ||
IBM OS/2 | ||
Linux Kernel | ||
Microsoft Windows 2000 | ||
Microsoft Windows Server 2003 | ||
Microsoft Windows 9x | ||
Microsoft Windows 9x | =gold | |
Microsoft Windows 98 | ||
Microsoft Windows | ||
Microsoft Windows NT | =4.0 | |
Microsoft Windows XP | ||
SCO UNIX | ||
Oracle Solaris and Zettabyte File System (ZFS) | ||
Wind River BSD OS | ||
Achievo | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2736 has been classified as a critical vulnerability due to the potential for arbitrary PHP code execution.
To rectify CVE-2007-2736, upgrade Achievo to a version later than 1.1.0 where the vulnerability has been patched.
CVE-2007-2736 can allow remote attackers to execute arbitrary scripts, leading to compromise and loss of control of the affected server.
CVE-2007-2736 specifically affects Achievo version 1.1.0.
Yes, CVE-2007-2736 can be exploited remotely, enabling attackers to execute harmful code without physical access.