PHP remote file inclusion vulnerability in get_header.php in VWar 1.5.0 R12 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the vwar_root parameter. NOTE: this is a different vulnerability than CVE-2006-1503.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.securityfocus.com/vulnerabilities/exploits/VWar_1.5.0_R12.pl - Exploit | |
References | () http://secunia.com/advisories/19524 - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/24480 - | |
References | () http://www.securityfocus.com/archive/1/429742/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17358 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/1228 - Vendor Advisory |
Information
Published : 2006-04-06 10:04
Updated : 2024-11-21 00:09
NVD link : CVE-2006-1636
Mitre link : CVE-2006-1636
CVE.ORG link : CVE-2006-1636
JSON object : View
Products Affected
vwar
- virtual_war
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')