CVE-2006-4596

PHP remote file inclusion in MyBace Light Skrip, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the (1) hauptverzeichniss parameter in includes/login_check.php and the (2) template_back parameter in admin/login/content/user_daten.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mybace_light:mybace_light:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () http://secunia.com/advisories/21746 - Vendor Advisory () http://secunia.com/advisories/21746 - Vendor Advisory
References () http://www.bb-pcsecurity.de/Websecurity/384/org/MyBace_Light_%28hauptverzeichniss%29_Remote_File_Inclusion.htm - () http://www.bb-pcsecurity.de/Websecurity/384/org/MyBace_Light_%28hauptverzeichniss%29_Remote_File_Inclusion.htm -
References () http://www.securityfocus.com/archive/1/445185/100/0/threaded - () http://www.securityfocus.com/archive/1/445185/100/0/threaded -
References () http://www.securityfocus.com/bid/19811 - () http://www.securityfocus.com/bid/19811 -
References () http://www.securityfocus.com/bid/19830 - () http://www.securityfocus.com/bid/19830 -
References () http://www.vupen.com/english/advisories/2006/3447 - () http://www.vupen.com/english/advisories/2006/3447 -

Information

Published : 2006-09-07 00:04

Updated : 2025-04-03 01:03


NVD link : CVE-2006-4596

Mitre link : CVE-2006-4596

CVE.ORG link : CVE-2006-4596


JSON object : View

Products Affected

mybace_light

  • mybace_light