Vulnerability Details : CVE-2006-4673
Global variable overwrite vulnerability in maincore.php in PHP-Fusion 6.01.4 and earlier uses the extract function on the superglobals, which allows remote attackers to conduct SQL injection attacks via the _SERVER[REMOTE_ADDR] parameter to news.php.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2006-4673
Probability of exploitation activity in the next 30 days: 1.01%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-4673
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:N/I:P/A:N |
4.9
|
2.9
|
[email protected] |
References for CVE-2006-4673
-
http://www.php-fusion.co.uk/news.php?readmore=353
-
http://retrogod.altervista.org/phpfusion_6-01-4_xpl.html
Exploit
-
http://www.securityfocus.com/bid/19908
Exploit
-
http://marc.info/?l=bugtraq&m=115765187519458&w=2
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28818
-
http://www.vupen.com/english/advisories/2006/3523
Products affected by CVE-2006-4673
- cpe:2.3:a:php_fusion:php_fusion:*:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.105:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.106:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.107:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.306:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.307:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.110:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.204:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.206:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.109:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.303:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.0.304:*:*:*:*:*:*:*