Multiple PHP remote file inclusion vulnerabilities in Christopher Fowler (Rhode Island) RSSonate allow remote attackers to execute arbitrary PHP code via a URL in the PROJECT_ROOT parameter to (1) xml2rss.php, (2) config_local.php, (3) rssonate.php, and (4) sql2xml.php in Src/getFeed/inc/.
References
Configurations
History
21 Nov 2024, 00:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/22496 - Vendor Advisory | |
References | () http://www.osvdb.org/29935 - | |
References | () http://www.osvdb.org/29936 - | |
References | () http://www.osvdb.org/29937 - | |
References | () http://www.osvdb.org/29938 - | |
References | () http://www.securityfocus.com/bid/20654 - | |
References | () http://www.vupen.com/english/advisories/2006/4146 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29703 - | |
References | () https://www.exploit-db.com/exploits/2605 - |
Information
Published : 2006-10-26 16:07
Updated : 2025-04-09 00:30
NVD link : CVE-2006-5518
Mitre link : CVE-2006-5518
CVE.ORG link : CVE-2006-5518
JSON object : View
Products Affected
christopher_fowler
- rssonate
CWE