Vulnerability Details : CVE-2006-4609
Multiple PHP remote file inclusion vulnerabilities in the Content Management module ("Content manager") for PHProjekt 0.6.1, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via the path_pre parameter in (1) cm_lib.inc.php, (2) doc/br.edithelp.php, (3) doc/de.edithelp.php, (4) doc/ct.edithelp.php, (5) userrating.php, and (6) listing.php, a different set of vectors than CVE-2006-4204. NOTE: a third-party researcher has disputed the impact of the cm_lib.inc.php vector, stating that it is limited to local file inclusion. CVE analysis as of 20060905 concurs, although use of ftp URLs is also possible. The remaining five vectors have also been disputed by the same third party, stating that the path_pre variable is initialized before it is used
Vulnerability category: File inclusion
Exploit prediction scoring system (EPSS) score for CVE-2006-4609
Probability of exploitation activity in the next 30 days: 2.90%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-4609
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2006-4609
-
http://www.vupen.com/english/advisories/2006/3373
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://secunia.com/advisories/21590
About Secunia Research | Flexera
-
http://www.securityfocus.com/archive/1/444076/100/100/threaded
-
http://www.securityfocus.com/archive/1/444220/100/100/threaded
-
http://securityreason.com/securityalert/1495
PHProjekt v0.6.1 Remote File Inclusion Vulnerability (2) - CXSecurity.com
-
http://www.osvdb.org/28217
404 Not Found
Products affected by CVE-2006-4609
- cpe:2.3:a:phpprojekt:phpprojekt:0.6.1:*:*:*:*:*:*:*