Vulnerability Details : CVE-2006-5097
PHP remote file inclusion vulnerability in index.php in net2ftp, possibly 0.1 through 0.62, allows remote attackers to execute arbitrary PHP code via a URL in the application_rootdir parameter. NOTE: this issue has been disputed by a third party researcher, CVE, and the vendor. The vendor says "the variable is set in settings.inc.php, so this is not a vulnerability.
Vulnerability category: File inclusion
Products affected by CVE-2006-5097
- cpe:2.3:a:net2ftp:net2ftp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5097
13.70%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5097
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-5097
-
http://www.net2ftp.org/forums/viewtopic.php?pid=6687
net2ftp.orgURL Repurposed
-
http://www.securityfocus.com/archive/1/448037/100/0/threaded
-
http://www.securityfocus.com/archive/1/447156/100/0/threaded
-
http://www.attrition.org/pipermail/vim/2006-October/001076.html
[VIM] net2ftp: a web based FTP client :) <= Remote File Inclusion (fwd)
-
http://www.net2ftp.org/forums/viewtopic.php?pid=6689
net2ftp.orgURL Repurposed
-
http://www.securityfocus.com/archive/1/447535/100/0/threaded
-
http://www.net2ftp.org/forums/viewtopic.php?pid=6676
net2ftp.orgURL Repurposed
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/29203
Vulnerability Report
-
http://www.attrition.org/pipermail/vim/2006-October/001077.html
[VIM] net2ftp: a web based FTP client :) <= Remote File Inclusion (fwd)
-
http://www.securityfocus.com/archive/1/447916/100/0/threaded
-
http://securityreason.com/securityalert/1655
net2ftp: a web based FTP client :) <= Remote File Inclusion - CXSecurity.com
Jump to