ID CVE-2006-4075
Summary Multiple PHP remote file inclusion vulnerabilities in Wim Fleischhauer docpile: wim's edition (docpile:we) 0.2.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the INIT_PATH parameter to (1) lib/folder.class.php, (2) lib/email.inc.php, (3) lib/document.class.php or (4) lib/auth.inc.php. Successful exploitation requires that "register_globals" is enabled.
References
Vulnerable Configurations
  • cpe:2.3:a:wim_fleischhauer:docpile_we:*:*:*:*:*:*:*:*
    cpe:2.3:a:wim_fleischhauer:docpile_we:*:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 17-10-2018 - 21:33)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 19428
bugtraq 20060808 docpile:we v0.2.2 (INIT_PATH) Remote File Inclusion Vulnerability
exploit-db 2146
osvdb
  • 27859
  • 27860
  • 27861
  • 27862
sectrack 1016669
secunia 21412
sreason 1367
vupen ADV-2006-3222
xf docpilewe-initpath-file-include(28273)
Last major update 17-10-2018 - 21:33
Published 11-08-2006 - 01:04
Last modified 17-10-2018 - 21:33
Back to Top