CVE-2006-5402

Multiple PHP remote file inclusion vulnerabilities in PHPmybibli 3.0.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) class_path, (2) javascript_path, and (3) include_path parameters in (a) cart.php; the (4) class_path parameter in (b) index.php; the (5) javascript_path parameter in (c) edit.php; the (6) include_path parameter in (d) circ.php; unspecified parameters in (e) select.php; and unspecified parameters in other files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpmybibli:phpmybibli:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:19

Type Values Removed Values Added
References () http://advisories.echo.or.id/adv/adv55-theday-2006.txt - Exploit, Vendor Advisory () http://advisories.echo.or.id/adv/adv55-theday-2006.txt - Exploit, Vendor Advisory
References () http://attrition.org/pipermail/vim/2006-October/001087.html - () http://attrition.org/pipermail/vim/2006-October/001087.html -
References () http://attrition.org/pipermail/vim/2006-October/001088.html - () http://attrition.org/pipermail/vim/2006-October/001088.html -
References () http://marc.info/?l=bugtraq&m=116110988829381&w=2 - () http://marc.info/?l=bugtraq&m=116110988829381&w=2 -
References () http://www.securityfocus.com/bid/20578 - Exploit, Patch () http://www.securityfocus.com/bid/20578 - Exploit, Patch
References () http://www.sigb.net/patch.php - () http://www.sigb.net/patch.php -
References () http://www.vupen.com/english/advisories/2006/4064 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4064 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29627 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29627 -

Information

Published : 2006-10-18 23:07

Updated : 2024-11-21 00:19


NVD link : CVE-2006-5402

Mitre link : CVE-2006-5402

CVE.ORG link : CVE-2006-5402


JSON object : View

Products Affected

phpmybibli

  • phpmybibli
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')