ID CVE-2006-4848
Summary Multiple PHP remote file inclusion vulnerabilities in Brian Fraval Hitweb 3.0 allow remote attackers to execute arbitrary PHP code via a URL in the REP_CLASS parameter to (1) index.php, (2) arbo.php, (3) framepoint.php, (4) genpage.php, (5) lienvalider.php, (6) appreciation.php, (7) partenariat.php, (8) rechercher.php, (9) projet.php, (10) propoexample.php, (11) refererpoint.php, or (12) top50.php. NOTE: this issue has been disputed by a third party researcher, stating that REP_CLASS is initialized in an included file before being used
References
Vulnerable Configurations
  • cpe:2.3:a:hitweb:hitweb:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:hitweb:hitweb:3.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 07-08-2024 - 20:15)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 20060
bugtraq
  • 20060915 HitWeb v3.0 - Remote File Include Vulnerabilities
  • 20060920 Re: HitWeb v3.0 - Remote File Include Vulnerabilities
sreason 1590
Last major update 07-08-2024 - 20:15
Published 19-09-2006 - 01:07
Last modified 07-08-2024 - 20:15
Back to Top