ID CVE-2006-4723
Summary PHP remote file inclusion vulnerability in raidenhttpd-admin/slice/check.php in RaidenHTTPD 1.1.49, when register_globals and WebAdmin is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the SoftParserFileXml parameter. Successful exploitation requires that "register_globals" and "WebAdmin" are enabled.
References
Vulnerable Configurations
  • cpe:2.3:a:raidenhttpd:raidenhttpd:1.1.32:*:*:*:*:*:*:*
    cpe:2.3:a:raidenhttpd:raidenhttpd:1.1.32:*:*:*:*:*:*:*
  • cpe:2.3:a:raidenhttpd:raidenhttpd:1.1.47:*:*:*:*:*:*:*
    cpe:2.3:a:raidenhttpd:raidenhttpd:1.1.47:*:*:*:*:*:*:*
  • cpe:2.3:a:raidenhttpd:raidenhttpd:*:*:*:*:*:*:*:*
    cpe:2.3:a:raidenhttpd:raidenhttpd:*:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 19-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 19918
exploit-db 2328
secunia 21833
vupen ADV-2006-3542
xf raidenhttpd-check-file-include(28821)
Last major update 19-10-2017 - 01:29
Published 12-09-2006 - 16:07
Last modified 19-10-2017 - 01:29
Back to Top