Multiple PHP remote file inclusion vulnerabilities in Redaction System 1.0000 allow remote attackers to execute arbitrary PHP code via a URL in the (1) lang_prefix parameter to (a) conn.php, (b) sesscheck.php, (c) wap/conn.php, or (d) wap/sesscheck.php, or the (2) lang parameter to (e) index.php.
References
Configurations
History
21 Nov 2024, 00:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://redactionsystem.sourceforge.net/index.php?m=news&id=2 - | |
References | () http://redactionsystem.sourceforge.net/index.php?m=news&id=5 - | |
References | () http://secunia.com/advisories/22347 - Vendor Advisory | |
References | () http://www.osvdb.org/29700 - | |
References | () http://www.osvdb.org/29701 - | |
References | () http://www.osvdb.org/29702 - | |
References | () http://www.osvdb.org/29703 - | |
References | () http://www.osvdb.org/29704 - | |
References | () http://www.securityfocus.com/bid/20499 - | |
References | () http://www.vupen.com/english/advisories/2006/4024 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29504 - | |
References | () https://www.exploit-db.com/exploits/2534 - |
Information
Published : 2006-10-17 15:07
Updated : 2024-11-21 00:18
NVD link : CVE-2006-5302
Mitre link : CVE-2006-5302
CVE.ORG link : CVE-2006-5302
JSON object : View
Products Affected
redaction_system
- redaction_system
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')