ID CVE-2006-2608
Summary artmedic newsletter 4.1 and possibly other versions, when register_globals is enabled, allows remote attackers to modify arbitrary files and execute arbitrary PHP code via the logfile parameter in a direct request to log.php, which causes the $logfile variable to be redefined to an attacker-controlled value, as demonstrated by injecting PHP code into info.php.
References
Vulnerable Configurations
  • cpe:2.3:a:artmedic_webdesign:artmedic_newsletter:4.1:*:*:*:*:*:*:*
    cpe:2.3:a:artmedic_webdesign:artmedic_newsletter:4.1:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 18-10-2018 - 16:40)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 18047
bugtraq 20060519 Remote Code Execution in artmedic Newsletter 4.1 [log.php]
secunia 20204
sreason 957
vupen ADV-2006-1930
xf artmedic-newsletter-code-execution(26597)
Last major update 18-10-2018 - 16:40
Published 26-05-2006 - 01:06
Last modified 18-10-2018 - 16:40
Back to Top