Show plain JSON{"id": "CVE-2007-2199", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2007-04-24T20:19:00.000", "references": [{"url": "http://osvdb.org/34803", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/36009", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/25230", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.attrition.org/pipermail/vim/2007-May/001618.html", "source": "cve@mitre.org"}, {"url": "http://www.hackers.ir/advisories/joomla.html", "tags": ["Exploit", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/466687/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/478503/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/23613", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/23708", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/24660", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/25528", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2007/1511", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33837", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34273", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35092", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/3781", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/3915", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/4111", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-94"}]}], "descriptions": [{"lang": "en", "value": "PHP remote file inclusion vulnerability in lib/pcltar.lib.php (aka pcltar.php) in the PclTar module 1.3 and 1.3.1 for Vincent Blavet PhpConcept Library, as used in multiple products including (1) Joomla! 1.5.0 Beta, (2) N/X Web Content Management System (WCMS) 4.5, (3) CJG EXPLORER PRO 3.3, and (4) phpSiteBackup 0.1, allows remote attackers to execute arbitrary PHP code via a URL in the g_pcltar_lib_dir parameter."}, {"lang": "es", "value": "Una vulnerabilidad de inclusi\u00f3n remota de archivos PHP en lib/pcltar.lib.php (tambi\u00e9n se conoce como pcltar.php) en el m\u00f3dulo PclTar versiones 1.3 y 1.3.1 para la Biblioteca PhpConcept de Vincent Blavet, tal como se utiliza en varios productos, incluido (1) Joomla! versi\u00f3n 1.5.0 Beta, (2) N/X Web Content Management System (WCMS) versi\u00f3n 4.5, (3) CJG EXPLORER PRO versi\u00f3n 3.3, y (4) phpSiteBackup versi\u00f3n 0.1, permite a atacantes remotos ejecutar c\u00f3digo PHP arbitrario por medio de una URL en el par\u00e1metro g_pcltar_lib_dir ."}], "lastModified": "2018-10-16T16:42:27.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cjg_explorer_pro:cjg_explorer_pro:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DFD7168-2109-4E5D-AFA4-CA1629FA5FB6"}, {"criteria": "cpe:2.3:a:joomla:joomla:1.5.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D548B3C9-483F-492C-A6BB-694B7217FEE8"}, {"criteria": "cpe:2.3:a:nx:n_x_wcms:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9EF055B-8A9E-4EFB-A0E0-EB1C8400080B"}, {"criteria": "cpe:2.3:a:phpsitebackup:phpsitebackup:0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "348884F6-BB44-4BAF-95AD-63A86C175B01"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}