Vulnerability CVE-2006-3019


Published: 2006-06-15   Modified: 2012-02-12

Description:
Multiple PHP remote file inclusion vulnerabilities in phpCMS 1.2.1pl2 allow remote attackers to execute arbitrary PHP code via a URL in the PHPCMS_INCLUDEPATH parameter to files in parser/include/ including (1) class.parser_phpcms.php, (2) class.session_phpcms.php, (3) class.edit_phpcms.php, (4) class.http_indexer_phpcms.php, (5) class.cache_phpcms.php, (6) class.search_phpcms.php, (7) class.lib_indexer_universal_phpcms.php, and (8) class.layout_phpcms.php, (9) parser/plugs/counter.php, and (10) parser/parser.php. NOTE: the class.cache_phpcms.php vector was also reported to affect 1.1.7.

See advisories in our WLB2 database:
Topic
Author
Date
High
phpCMS 1.2.1pl2, Remote command execution
Federico Fazzi (...
19.06.2006

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Phpcms -> Phpcms 

 References:
http://securityreason.com/securityalert/1106
http://www.securityfocus.com/archive/1/436893/100/0/threaded
http://www.securityfocus.com/archive/1/455302/100/0/threaded
http://www.securityfocus.com/bid/21768
http://www.vupen.com/english/advisories/2006/2302
https://exchange.xforce.ibmcloud.com/vulnerabilities/27067

Copyright 2024, cxsecurity.com

 

Back to Top