Vulnerability Details : CVE-2006-1888
phpGraphy 0.9.11 and earlier allows remote attackers to bypass authentication and gain administrator privileges via a direct request to index.php with the editwelcome parameter set to 1, which can then be used to modify the main page to inject arbitrary HTML and web script. NOTE: XSS attacks are resultant from this issue, since normal functionality allows the admin to modify pages.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2006-1888
- cpe:2.3:a:phpgraphy:phpgraphy:*:*:*:*:*:*:*:*
- cpe:2.3:a:phpgraphy:phpgraphy:0.9.9a:*:*:*:*:*:*:*
- cpe:2.3:a:phpgraphy:phpgraphy:0.9.10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1888
0.78%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1888
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2006-1888
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-1888
-
http://www.vupen.com/english/advisories/2006/1379
Vendor Advisory
-
http://www.securityfocus.com/archive/1/431268/100/0/threaded
-
http://www.securityfocus.com/archive/1/431128/100/0/threaded
-
http://securitytracker.com/id?1015971
-
http://securityreason.com/securityalert/733
-
http://retrogod.altervista.org/phpgraphy_0911_adv.html
Exploit
-
http://www.securityfocus.com/bid/17567
Exploit;Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25892
Jump to