First published: Thu Sep 06 2007(Updated: )
Multiple PHP remote file inclusion vulnerabilities in SpeedTech PHP Library (STPHPLibrary) 0.8.0 allow remote attackers to execute arbitrary PHP code via a URL in the STPHPLIB_DIR parameter to (1) stphpapplication.php, (2) stphpbtnimage.php, or (3) stphpform.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Speedtech Stphplibrary | =0.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4737 is considered to have a high severity due to its potential to allow arbitrary PHP code execution.
To fix CVE-2007-4737, ensure that the STPHPLIB_DIR parameter is properly sanitized and validate input to prevent remote file inclusion.
CVE-2007-4737 affects SpeedTech PHP Library version 0.8.0.
CVE-2007-4737 impacts systems using the SpeedTech PHP Library specifically version 0.8.0.
Yes, CVE-2007-4737 can be exploited remotely by attackers to execute arbitrary PHP code.