Multiple PHP remote file inclusion vulnerabilities in nicecoder.com INDEXU 5.0.0 and 5.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the theme_path parameter in (1) index.php, (2) become_editor.php, (3) add.php, (4) bad_link.php, (5) browse.php, (6) detail.php, (7) fav.php, (8) get_rated.php, (9) login.php, (10) mailing_list.php, (11) new.php, (12) modify.php, (13) pick.php, (14) power_search.php, (15) rating.php, (16) register.php, (17) review.php, (18) rss.php, (19) search.php, (20) send_pwd.php, (21) sendmail.php, (22) tell_friend.php, (23) top_rated.php, (24) user_detail.php, and (25) user_search.php; and the (26) base_path parameter in invoice.php.
Publish Date : 2006-04-13 Last Update Date : 2018-10-18
-
CVSS Scores & Vulnerability Types
CVSS Score |
7.5 |
Confidentiality Impact |
Partial
(There is considerable informational disclosure.) |
Integrity Impact |
Partial
(Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.) |
Availability Impact |
Partial
(There is reduced performance or interruptions in resource availability.) |
Access Complexity |
Low
(Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. ) |
Authentication |
Not required
(Authentication is not required to exploit the vulnerability.) |
Gained Access |
None |
Vulnerability Type(s) |
Execute CodeFile Inclusion |
CWE ID |
CWE id is not defined for this vulnerability |
|
|
-
Products Affected By CVE-2006-1767
-
Number Of Affected Versions By Product
-
References For CVE-2006-1767
|
|