ID CVE-2006-2864
Summary Multiple PHP remote file inclusion vulnerabilities in BlueShoes Framework 4.6 allow remote attackers to execute arbitrary PHP code via a URL in the (1) APP[path][applications] parameter to (a) Bs_Faq.class.php, (2) APP[path][core] parameter to (b) fileBrowserInner.php, (c) file.php, and (d) viewer.php, and (e) Bs_ImageArchive.class.php, (3) GLOBALS[APP][path][core] parameter to (f) Bs_Ml_User.class.php, or (4) APP[path][plugins] parameter to (g) Bs_Wse_Profile.class.php. Successful exploitation requires that "register_global" is enabled.
References
Vulnerable Configurations
  • cpe:2.3:a:blueshoes:blueshoes_framework:4.5:*:*:*:*:*:*:*
    cpe:2.3:a:blueshoes:blueshoes_framework:4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:blueshoes:blueshoes_framework:*:*:*:*:*:*:*:*
    cpe:2.3:a:blueshoes:blueshoes_framework:*:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 19-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 18261
confirm http://www.blueshoes.org/en/news/
exploit-db 1870
osvdb
  • 25996
  • 25997
  • 25998
  • 25999
  • 26000
  • 26001
  • 26002
secunia 20438
vupen ADV-2006-2128
xf blueshoes-multiple-scripts-file-include(26908)
Last major update 19-10-2017 - 01:29
Published 06-06-2006 - 20:06
Last modified 19-10-2017 - 01:29
Back to Top