PHP remote file inclusion vulnerability in visitor.php in Butterfly online visitors counter 1.08, when used with certain older versions of PHP with improper SERVER superglobal handling, allows remote attackers to execute arbitrary PHP code via a URL in the _SERVER[DOCUMENT_ROOT] parameter. NOTE: it could be argued that this vulnerability is caused by a problem in PHP and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in Butterfly online visitors counter.
References
Configurations
History
21 Nov 2024, 00:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/38327 - | |
References | () http://securityvulns.com/Rdocument845.html - Exploit | |
References | () http://securityvulns.com/source26994.html - | |
References | () http://www.securityfocus.com/archive/1/477253/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/482006/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36147 - |
Information
Published : 2007-08-22 23:17
Updated : 2024-11-21 00:35
NVD link : CVE-2007-4485
Mitre link : CVE-2007-4485
CVE.ORG link : CVE-2007-4485
JSON object : View
Products Affected
butterfly
- butterfly
CWE