ID CVE-2006-4198
Summary PHP remote file inclusion vulnerability in includes/session.php in Wheatblog (wB) 1.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the wb_class_dir parameter. Successful exploitation requires that "register_globals" is enabled.
References
Vulnerable Configurations
  • cpe:2.3:a:wheatblog:wheatblog:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:wheatblog:wheatblog:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:wheatblog:wheatblog:*:*:*:*:*:*:*:*
    cpe:2.3:a:wheatblog:wheatblog:*:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 17-10-2018 - 21:33)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 19482
bugtraq
  • 20060811 wheatblog ُSession.php Remote File Inclusion
  • 20070630 WheatBlog 1.1 RFI/SQL Injection
confirm http://sourceforge.net/forum/forum.php?forum_id=601184
exploit-db 2174
misc http://secwatch.org/advisories/1015085/
secunia 25903
sreason 1410
vupen ADV-2007-2405
xf wheatblog-session-file-include(28338)
Last major update 17-10-2018 - 21:33
Published 17-08-2006 - 21:04
Last modified 17-10-2018 - 21:33
Back to Top