** DISPUTED ** PHP remote file inclusion vulnerability in contrib/yabbse/poc.php in phpopenchat before 3.0.2 allows remote attackers to execute arbitrary PHP code via the sourcedir parameter. NOTE: this issue was disputed by a third-party researcher who stated that the _REQUEST parameters were dynamically unset at the beginning of the file. Another researcher noted, and CVE agrees, that the unset PHP function can be bypassed (CVE-2006-3017). If this issue is due to a vulnerability in PHP, then it should be excluded from CVE.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://phpopenchat.org/index.php - | |
References | () http://www.securityfocus.com/archive/1/445384/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/445522/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/445580/100/0/threaded - |
Information
Published : 2006-09-11 17:04
Updated : 2024-11-21 00:16
NVD link : CVE-2006-4677
Mitre link : CVE-2006-4677
CVE.ORG link : CVE-2006-4677
JSON object : View
Products Affected
phpopenchat
- phpopenchat
CWE