ID CVE-2006-4656
Summary PHP remote file inclusion vulnerability in admin/editeur/spaw_control.class.php in Web Provence SL_Site 1.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: CVE analysis suggests that this issue is actually in a third party product, SPAW Editor PHP Edition.
References
Vulnerable Configurations
  • cpe:2.3:a:web-provence:sl_site:*:*:*:*:*:*:*:*
    cpe:2.3:a:web-provence:sl_site:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 17-10-2018 - 21:38)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 19892
bugtraq 20060907 SL_Site <= 1.0 [spaw_root] Remote File Include Vulnerability
confirm http://spaw.cvs.sourceforge.net/spaw/spaw/docs/ChangeLog.txt?view=markup
exploit-db 2317
misc
sectrack 1016814
sreason 1522
xf slsite-spaw-file-include(28783)
Last major update 17-10-2018 - 21:38
Published 09-09-2006 - 00:04
Last modified 17-10-2018 - 21:38
Back to Top