First published: Thu May 17 2007(Updated: )
PHP remote file inclusion vulnerability in index.php in Achievo 1.1.0 allows remote attackers to execute arbitrary PHP code via a URL in the config_atkroot parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
apple a ux | ||
Apple iOS and macOS | ||
HPE HP-UX | ||
HP Tru64 UNIX | ||
IBM OS/2 | ||
Linux Kernel | ||
Microsoft Windows 2000 | ||
Microsoft Windows 2003 Server | ||
Microsoft Windows 95 | ||
Microsoft Windows 98 | =gold | |
Microsoft Windows 98SE | ||
Microsoft Windows Me | ||
Microsoft Windows NT | =4.0 | |
Microsoft Windows XP | ||
santa cruz operation sco unix | ||
Oracle Solaris SPARC | ||
windriver bsdos | ||
Achievo | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2736 has been classified as a critical vulnerability due to the potential for arbitrary PHP code execution.
To rectify CVE-2007-2736, upgrade Achievo to a version later than 1.1.0 where the vulnerability has been patched.
CVE-2007-2736 can allow remote attackers to execute arbitrary scripts, leading to compromise and loss of control of the affected server.
CVE-2007-2736 specifically affects Achievo version 1.1.0.
Yes, CVE-2007-2736 can be exploited remotely, enabling attackers to execute harmful code without physical access.