Vulnerability Details : CVE-2007-1399
Potential exploit
Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8.3 and earlier, as bundled with PHP 5.2.0 and 5.2.1, allows remote attackers to execute arbitrary code via a long zip:// URL, as demonstrated by actively triggering URL access from a remote PHP interpreter via avatar upload or blog pingback.
Vulnerability category: OverflowExecute code
Products affected by CVE-2007-1399
- cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:pecl_zip:1.8.3:*:*:*:*:*:*:*:*
Threat overview for CVE-2007-1399
Top countries where our scanners detected CVE-2007-1399
Top open port discovered on systems with this issue
80
IPs affected by CVE-2007-1399 2,823
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-1399!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-1399
33.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-1399
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
Vendor statements for CVE-2007-1399
-
Red Hat 2007-04-16Not vulnerable. The zip extension was not shipped in versions of PHP provided for Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
References for CVE-2007-1399
-
http://www.php-security.org/MOPB/MOPB-16-2007.html
Exploit;Vendor Advisory
-
http://www.debian.org/security/2007/dsa-1330
-
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/32889
-
http://www.securityfocus.com/bid/22883
-
http://www.vupen.com/english/advisories/2007/0898
Jump to