CVE-2007-2609
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
11/05/2007
Last modified:
09/04/2025
Description
Multiple PHP remote file inclusion vulnerabilities in gnuedu 1.3b2 allow remote attackers to execute arbitrary PHP code via a URL in the (a) ETCDIR parameter to (1) libs/lom.php; (2) lom_update.php, (3) check-lom.php, and (4) weigh_keywords.php in scripts/; the (b) LIBSDIR parameter to (5) logout.php, (6) help.php, (7) index.php, (8) login.php; and the ETCDIR parameter to (9) web/lom.php.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnuedu:gnu_edu:1.3b2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/38248
- http://osvdb.org/38249
- http://osvdb.org/38250
- http://osvdb.org/38251
- http://osvdb.org/38252
- http://osvdb.org/38253
- http://osvdb.org/38254
- http://osvdb.org/38255
- http://osvdb.org/38256
- http://www.securityfocus.com/bid/23883
- http://www.vupen.com/english/advisories/2007/1736
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34174
- https://www.exploit-db.com/exploits/3876
- http://osvdb.org/38248
- http://osvdb.org/38249
- http://osvdb.org/38250
- http://osvdb.org/38251
- http://osvdb.org/38252
- http://osvdb.org/38253
- http://osvdb.org/38254
- http://osvdb.org/38255
- http://osvdb.org/38256
- http://www.securityfocus.com/bid/23883
- http://www.vupen.com/english/advisories/2007/1736
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34174
- https://www.exploit-db.com/exploits/3876



