ID CVE-2006-2768
Summary PHP remote file inclusion vulnerability in METAjour 2.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the (1) system_path parameter in a large number of files in the (a) app/edocument/, (b) app/eproject/, (c) app/erek/, and (d) extension/ directories, and the (2) GLOBALS[system_path] parameter in (e) extension/sitemap/sitemap.datatype.php. Successful exploitation requires that "register_globals" is enabled.
References
Vulnerable Configurations
  • cpe:2.3:a:ipw_systems:metajour:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:ipw_systems:metajour:2.1:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 19-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 18211
exploit-db 1855
secunia 20404
vupen ADV-2006-2077
xf metajour-systempath-file-include(26892)
Last major update 19-10-2017 - 01:29
Published 02-06-2006 - 10:18
Last modified 19-10-2017 - 01:29
Back to Top