Multiple PHP remote file inclusion vulnerabilities in DotWidget For Articles (dotwidgeta) 0.2 allow remote attackers to execute arbitrary code via a URL in the (1) file_path parameter to (a) index.php, (b) showcatpicks.php, and (c) showarticle.php; and the (2) admin_header_file and (3) admin_footer_file parameters to (d) admin/authors.php, (e) admin/index.php, (f) admin/categories.php, (g) admin/editconfig.php, and (h) admin/articles.php.
References
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/2308 - | |
References | () http://www.securityfocus.com/archive/1/437483 - Exploit | |
References | () http://www.securityfocus.com/bid/18479 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27327 - |
Information
Published : 2007-02-24 00:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-7052
Mitre link : CVE-2006-7052
CVE.ORG link : CVE-2006-7052
JSON object : View
Products Affected
keith_reichley
- dotwidget_for_articles
CWE