Vulnerability Details : CVE-2006-3053
** DISPUTED ** PHP remote file inclusion vulnerability in common.php in PHORUM 5.1.13 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the PHORUM[http_path] parameter. NOTE: this issue has been disputed by the vendor, who states "common.php is checked on the very first line of non-comment code that it is not being called directly. It has been this way in all 5.x version of Phorum." CVE analysis concurs with the vendor.
Vulnerability category: File inclusion
Exploit prediction scoring system (EPSS) score for CVE-2006-3053
Probability of exploitation activity in the next 30 days: 8.56%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3053
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-3053
Products affected by CVE-2006-3053
- cpe:2.3:a:phorum:phorum:*:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.3.2a:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.3_beta:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.7_beta:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.1.1a:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.2.3a:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.3.1a:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.1.1_pre:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.1.1_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.2.3b:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.3.2b3:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.15a:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:3.4.8a:*:*:*:*:*:*:*
- cpe:2.3:a:phorum:phorum:5.0.17a:*:*:*:*:*:*:*