CVE-2007-4738

SpeedTech PHP Library 0.8.0 - Remote File Inclusion via db_conf, ADODB_DIR, or STPHPLIB_DIR Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-4738. PoCs published by leetsecurity.

AI-analyzed exploit summary This is a technical writeup describing a Remote File Inclusion (RFI) vulnerability in SpeedTech PHP Library. The vulnerability is due to improper input validation in the 'STPHPLIB_DIR' parameter, allowing remote attackers to include arbitrary files.

Description

Multiple PHP remote file inclusion vulnerabilities in SpeedTech PHP Library (STPHPLibrary) 0.8.0 allow remote attackers to execute arbitrary PHP code via a URL in the (1) db_conf or (2) ADODB_DIR parameter to utils/stphpimage_show.php; or a URL in the STPHPLIB_DIR parameter to (3) stphpbutton.php, (4) stphpcheckbox.php, (5) stphpcheckboxwithcaption.php, (6) stphpcheckgroup.php, (7) stphpcomponent.php, (8) stphpcontrolwithcaption.php, (9) stphpedit.php, (10) stphpeditwithcaption.php, (11) stphphr.php, (12) stphpimage.php, (13) stphpimagewithcaption.php, (14) stphplabel.php, (15) stphplistbox.php, (16) stphplistboxwithcaption.php, (17) stphplocale.php, (18) stphppanel.php, (19) stphpradiobutton.php, (20) stphpradiobuttonwithcaption.php, (21) stphpradiogroup.php, (22) stphprichbutton.php, (23) stphpspacer.php, (24) stphptable.php, (25) stphptablecell.php, (26) stphptablerow.php, (27) stphptabpanel.php, (28) stphptabtitle.php, (29) stphptextarea.php, (30) stphptextareawithcaption.php, (31) stphptoolbar.php, (32) stphpwindow.php, (33) stphpxmldoc.php, or (34) stphpxmlelement.php, a different set of vectors than CVE-2007-4737. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Exploits (1)

exploitdb WRITEUP VERIFIED
by leetsecurity · textwebappsphp
https://www.exploit-db.com/exploits/4358

This is a technical writeup describing a Remote File Inclusion (RFI) vulnerability in SpeedTech PHP Library. The vulnerability is due to improper input validation in the 'STPHPLIB_DIR' parameter, allowing remote attackers to include arbitrary files.

Classification
Writeup 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: SpeedTech PHP Library <= (version not specified)
No auth needed
Prerequisites: Network access to the target application · PHP configuration allowing remote file inclusion
devstral-2 · analyzed Feb 18, 2026 Full analysis →

References (36)

Core 36
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36417
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/26658
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39077
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39082
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39088
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39076
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39090
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39085
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39079
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39093
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39099
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39096
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39102
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39101
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39095
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39105
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39097
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39084
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39074
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39094
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39098
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39083
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39078
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39100
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39103
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39075
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39091
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/25525
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39089
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39081
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39087
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39080
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39104
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39073
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39092
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39086

Scores

EPSS 0.0491
EPSS Percentile 89.7%

Details

CWE
CWE-20 CWE-94
Status published
Products (1)
speedtech/stphplibrary 0.8.0
Published Sep 06, 2007
Tracked Since Feb 18, 2026