Vulnerability Details : CVE-2006-1477
Multiple PHP remote file inclusion vulnerabilities in Turnkey Web Tools PHP Live Helper 1.8 allow remote attackers to include and execute arbitrary PHP code via the abs_path parameter in (1) initiate.php, (2) waiting.php, (3) welcome.php, (4) admin/index.php, (5) javascript.php, (6) checkchat.php, and (7) blank.php.
Vulnerability category: File inclusion
Products affected by CVE-2006-1477
- cpe:2.3:a:turnkey_web_tools:php_live_helper:1.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1477
27.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1477
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-1477
-
http://www.securityfocus.com/archive/1/428976/100/0/threaded
-
http://www.worlddefacers.de/Public/WD-TMPLH.txt
Exploit
-
http://www.securityfocus.com/archive/1/437741/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25489
-
http://www.vupen.com/english/advisories/2006/1137
-
http://www.securityfocus.com/bid/18509
-
http://www.turnkeywebtools.com/forum/showthread.php?p=10415
Patch
-
http://www.securityfocus.com/archive/1/437648/100/0/threaded
Jump to