Multiple PHP remote file inclusion vulnerabilities in SunLight CMS 5.3 allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) _connect.php or (2) modules/startup.php.
References
| Link | Resource |
|---|---|
| http://osvdb.org/36227 | Broken Link |
| http://osvdb.org/36228 | Broken Link |
| http://secunia.com/advisories/25366 | Not Applicable |
| http://www.securityfocus.com/bid/24062 | Broken Link |
| http://www.vupen.com/english/advisories/2007/1885 | Not Applicable |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/34393 | Third Party Advisory |
| https://www.exploit-db.com/exploits/3953 | Exploit VDB Entry |
| http://osvdb.org/36227 | Broken Link |
| http://osvdb.org/36228 | Broken Link |
| http://secunia.com/advisories/25366 | Not Applicable |
| http://www.securityfocus.com/bid/24062 | Broken Link |
| http://www.vupen.com/english/advisories/2007/1885 | Not Applicable |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/34393 | Third Party Advisory |
| https://www.exploit-db.com/exploits/3953 | Exploit VDB Entry |
Configurations
History
No history.
Information
Published : 2007-05-21 23:30
Updated : 2026-02-06 20:55
NVD link : CVE-2007-2774
Mitre link : CVE-2007-2774
CVE.ORG link : CVE-2007-2774
JSON object : View
Products Affected
sunlight-cms
- sunlight_cms
CWE
