CVE-2007-6648

SanyBee Gallery <0.1.2 - Path Traversal

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-6648. PoCs published by jackal.

AI-analyzed exploit summary This exploit demonstrates a Local File Inclusion (LFI) vulnerability in SanyBee Gallery 0.1.1 by manipulating the 'p' parameter in the URL to include arbitrary files via null byte injection.

Description

Directory traversal vulnerability in index.php in SanyBee Gallery 0.1.0 and 0.1.1 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the p parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by jackal · textwebappsphp
https://www.exploit-db.com/exploits/4816

This exploit demonstrates a Local File Inclusion (LFI) vulnerability in SanyBee Gallery 0.1.1 by manipulating the 'p' parameter in the URL to include arbitrary files via null byte injection.

Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target: SanyBee Gallery 0.1.1
No auth needed
Prerequisites: Target must be running SanyBee Gallery 0.1.1 · The 'p' parameter must be accessible and vulnerable to LFI
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (5)

Core 5
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28270
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27072
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39784
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39392
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/4816

Scores

EPSS 0.0370
EPSS Percentile 88.1%

Details

CWE
CWE-22
Status published
Products (1)
sanybee_gallery/sanybee_gallery 0.1.1
Published Jan 04, 2008
Tracked Since Feb 18, 2026