CVE-2006-4063

Multiple PHP remote file inclusion vulnerabilities in Csaba Godor SAPID Blog Beta 2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) root_path parameter to (a) usr/extensions/get_blog_infochannel.inc.php, (b) usr/extensions/get_blog_meta_info.inc.php, or (c) usr/extensions/get_infochannel.inc.php; or the (2) GLOBALS[root_path] parameter to (d) usr/extensions/get_tree.inc.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:csaba_godor:sapid_blog_beta_2:initial:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://www.vupen.com/english/advisories/2006/3196 - () http://www.vupen.com/english/advisories/2006/3196 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28251 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28251 -
References () https://www.exploit-db.com/exploits/2129 - () https://www.exploit-db.com/exploits/2129 -

Information

Published : 2006-08-10 00:04

Updated : 2024-11-21 00:15


NVD link : CVE-2006-4063

Mitre link : CVE-2006-4063

CVE.ORG link : CVE-2006-4063


JSON object : View

Products Affected

csaba_godor

  • sapid_blog_beta_2