Vulnerability CVE-2006-4533


Published: 2006-09-01   Modified: 2012-02-12

Description:
Multiple PHP remote file inclusion vulnerabilities in Plume CMS 1.0.6 and earlier allow remote attackers to execute arbitrary PHP code via the _PX_config[manager_path] parameter to (1) articles.php, (2) categories.php, (3) news.php, (4) prefs.php, (5) sites.php, (6) subtypes.php, (7) users.php, (8) xmedia.php, (9) frontinc/class.template.php, (10) inc/lib.text.php, (11) install/index.php, (12) install/upgrade.php, and (13) tools/htaccess/index.php. NOTE: other vectors are covered by CVE-2006-3562, CVE-2006-2645, and CVE-2006-0725.

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Plume-cms -> Plume cms 

 References:
http://www.securityfocus.com/bid/19629
http://www.osvdb.org/31183
http://www.osvdb.org/31182
http://www.osvdb.org/31181
http://www.osvdb.org/31180
http://www.osvdb.org/31179
http://www.osvdb.org/31178
http://www.osvdb.org/31177
http://www.osvdb.org/31176
http://www.osvdb.org/31175
http://www.osvdb.org/31174
http://www.osvdb.org/31173
http://www.osvdb.org/31172
http://www.osvdb.org/31171
http://packetstormsecurity.org/0608-exploits/plume-1.0.6.txt

Copyright 2024, cxsecurity.com

 

Back to Top