CVE-2007-1458

N/A Unknown
Published: March 14, 2007 Modified: April 23, 2026
View on NVD

Description

Multiple PHP remote file inclusion vulnerabilities in CARE2X 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) inc_checkdate_lang.php, (2) inc_charset_fx.php, (3) inc_config_color.php, (4) inc_currency_set.php, (5) inc_db_makelink.php, (6) inc_diagnostics_report_fx.php, (7) inc_environment_global.php, (8) inc_front_chain_lang.php, (9) inc_init_crypt.php, (10) inc_load_copyrite.php, or (11) inc_news_save.php in include/; (12) diagnostics-report-index.php, (13) config_options_mascot.php, (14) barcode-labels.php, (15) chg-color.php, or (16) config_options_gui_template.php in main/; or unspecified other files.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/24481
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/34045
Source: cve@mitre.org
http://www.osvdb.org/34046
Source: cve@mitre.org
http://www.osvdb.org/34047
Source: cve@mitre.org
http://www.osvdb.org/34048
Source: cve@mitre.org
http://www.osvdb.org/34049
Source: cve@mitre.org
http://www.osvdb.org/34050
Source: cve@mitre.org
http://www.osvdb.org/34051
Source: cve@mitre.org
http://www.osvdb.org/34052
Source: cve@mitre.org
http://www.osvdb.org/34053
Source: cve@mitre.org
http://www.osvdb.org/34054
Source: cve@mitre.org
http://www.osvdb.org/34055
Source: cve@mitre.org
http://www.osvdb.org/34056
Source: cve@mitre.org
http://www.osvdb.org/34057
Source: cve@mitre.org
http://www.osvdb.org/34058
Source: cve@mitre.org
http://www.osvdb.org/34059
Source: cve@mitre.org
http://www.osvdb.org/34060
Source: cve@mitre.org
http://www.securityfocus.com/bid/22951
Source: cve@mitre.org
Exploit
http://advisories.echo.or.id/adv/adv72-theday-2007.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/24481
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/34045
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34046
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34047
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34048
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34049
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34050
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34051
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34052
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34053
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34054
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34055
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34056
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34057
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34058
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34059
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/34060
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/462808/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/22951
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.vupen.com/english/advisories/2007/0938
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/32981
Source: af854a3a-2127-422b-91ae-364da2661108

44 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
23.6%
96th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

care2x