Vulnerability Details CVE-2007-2358
Multiple PHP remote file inclusion vulnerabilities in b2evolution allow remote attackers to execute arbitrary PHP code via a URL in the (1) inc_path parameter to (a) a_noskin.php, (b) a_stub.php, (c) admin.php, (d) contact.php, (e) default.php, (f) index.php, and (g) multiblogs.php in blogs/; the (2) view_path and (3) control_path parameters to blogs/admin.php; and the (4) skins_path parameter to (h) blogs/contact.php and (i) blogs/multiblogs.php. NOTE: this issue is disputed by CVE, since the inc_path, view_path, control_path, and skins_path variables are all initialized in conf/_advanced.php before they are used
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 72.9%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2007-2358
-
cpe:2.3:a:b2evolution:b2evolution:4.1.0
-
cpe:2.3:a:b2evolution:b2evolution:4.1.1
-
cpe:2.3:a:b2evolution:b2evolution:4.1.2
-
cpe:2.3:a:b2evolution:b2evolution:4.1.3
-
cpe:2.3:a:b2evolution:b2evolution:4.1.4
-
cpe:2.3:a:b2evolution:b2evolution:4.1.5
-
cpe:2.3:a:b2evolution:b2evolution:4.1.6
-
cpe:2.3:a:b2evolution:b2evolution:4.1.7
-
cpe:2.3:a:b2evolution:b2evolution:5.1.2
-
cpe:2.3:a:b2evolution:b2evolution:5.2.0
-
cpe:2.3:a:b2evolution:b2evolution:5.2.1
-
cpe:2.3:a:b2evolution:b2evolution:5.2.2
-
cpe:2.3:a:b2evolution:b2evolution:6-9-4
-
cpe:2.3:a:b2evolution:b2evolution:6-9-5
-
cpe:2.3:a:b2evolution:b2evolution:6.0.0
-
cpe:2.3:a:b2evolution:b2evolution:6.1.2
-
cpe:2.3:a:b2evolution:b2evolution:6.11.6
-
cpe:2.3:a:b2evolution:b2evolution:6.4.2
-
cpe:2.3:a:b2evolution:b2evolution:6.4.3
-
cpe:2.3:a:b2evolution:b2evolution:6.4.4
-
cpe:2.3:a:b2evolution:b2evolution:6.5.0
-
cpe:2.3:a:b2evolution:b2evolution:6.6.0
-
cpe:2.3:a:b2evolution:b2evolution:6.6.1
-
cpe:2.3:a:b2evolution:b2evolution:6.6.10
-
cpe:2.3:a:b2evolution:b2evolution:6.6.2
-
cpe:2.3:a:b2evolution:b2evolution:6.6.3
-
cpe:2.3:a:b2evolution:b2evolution:6.6.4
-
cpe:2.3:a:b2evolution:b2evolution:6.6.5
-
cpe:2.3:a:b2evolution:b2evolution:6.6.6
-
cpe:2.3:a:b2evolution:b2evolution:6.6.7
-
cpe:2.3:a:b2evolution:b2evolution:6.6.8
-
cpe:2.3:a:b2evolution:b2evolution:6.6.9
-
cpe:2.3:a:b2evolution:b2evolution:6.7.0
-
cpe:2.3:a:b2evolution:b2evolution:6.7.1
-
cpe:2.3:a:b2evolution:b2evolution:6.7.10
-
cpe:2.3:a:b2evolution:b2evolution:6.7.11
-
cpe:2.3:a:b2evolution:b2evolution:6.7.2
-
cpe:2.3:a:b2evolution:b2evolution:6.7.3
-
cpe:2.3:a:b2evolution:b2evolution:6.7.4
-
cpe:2.3:a:b2evolution:b2evolution:6.7.5
-
cpe:2.3:a:b2evolution:b2evolution:6.7.6
-
cpe:2.3:a:b2evolution:b2evolution:6.7.7
-
cpe:2.3:a:b2evolution:b2evolution:6.7.8
-
cpe:2.3:a:b2evolution:b2evolution:6.7.9
-
cpe:2.3:a:b2evolution:b2evolution:6.8.0
-
cpe:2.3:a:b2evolution:b2evolution:6.8.1
-
cpe:2.3:a:b2evolution:b2evolution:6.8.10
-
cpe:2.3:a:b2evolution:b2evolution:6.8.11
-
cpe:2.3:a:b2evolution:b2evolution:6.8.2
-
cpe:2.3:a:b2evolution:b2evolution:6.8.3
-
cpe:2.3:a:b2evolution:b2evolution:6.8.4
-
cpe:2.3:a:b2evolution:b2evolution:6.8.5
-
cpe:2.3:a:b2evolution:b2evolution:6.8.6
-
cpe:2.3:a:b2evolution:b2evolution:6.8.7
-
cpe:2.3:a:b2evolution:b2evolution:6.8.8
-
cpe:2.3:a:b2evolution:b2evolution:6.8.9
-
cpe:2.3:a:b2evolution:b2evolution:6.9.0
-
cpe:2.3:a:b2evolution:b2evolution:6.9.1
-
cpe:2.3:a:b2evolution:b2evolution:6.9.2
-
cpe:2.3:a:b2evolution:b2evolution:6.9.3
-
cpe:2.3:a:b2evolution:b2evolution:6.9.4
-
cpe:2.3:a:b2evolution:b2evolution:6.9.5
-
cpe:2.3:a:b2evolution:b2evolution:6.9.6
-
cpe:2.3:a:b2evolution:b2evolution:7.2.2
-
cpe:2.3:a:b2evolution:b2evolution:7.2.3
-
cpe:2.3:a:b2evolution:b2evolution:7.2.5