Vulnerability Details : CVE-2006-4559
Potential exploit
Multiple PHP remote file inclusion vulnerabilities in Yet Another Community System (YACS) CMS 6.6.1 allow remote attackers to execute arbitrary PHP code via a URL in the context[path_to_root] parameter in (1) articles/populate.php, (2) categories/category.php, (3) categories/populate.php, (4) comments/populate.php, (5) files/file.php, (6) sections/section.php, (7) sections/populate.php, (8) tables/populate.php, (9) users/user.php, and (10) users/populate.php. The articles/article.php vector is covered by CVE-2006-4532.
Vulnerability category: File inclusion
Products affected by CVE-2006-4559
- cpe:2.3:a:bernard_pacques:yet_another_community_system_cms:6.6.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4559
6.64%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-4559
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-4559
-
http://www.osvdb.org/31303
-
http://www.osvdb.org/31305
-
http://www.osvdb.org/31309
-
http://www.osvdb.org/31308
-
http://secunia.com/advisories/21680
Exploit;Patch;Vendor Advisory
-
http://www.osvdb.org/31310
-
http://www.osvdb.org/31306
-
http://www.yetanothercommunitysystem.com/yacs/articles/view.php/1664
Patch;URL Repurposed
-
http://www.osvdb.org/31307
-
http://www.osvdb.org/31302
-
http://www.osvdb.org/31301
-
http://www.osvdb.org/31304
Jump to