RULE(RULE ID:322331)

Rule General Information
Release Date: 2019-07-05
Rule Name: BerliOS Docpile_we folder.class.php INIT_PATH Parameter PHP File Include Vulnerability (CVE-2006-4075)
Severity:
CVE ID:
Rule Protection Details
Description: Multiple PHP remote file inclusion vulnerabilities in Wim Fleischhauer docpile: wim's edition (docpile:we) 0.2.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the INIT_PATH parameter to (1) lib/folder.class.php, (2) lib/email.inc.php, (3) lib/document.class.php or (4) lib/auth.inc.php.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: SecurityFocusBID:19428
ExploitDB:2146
http://securityreason.com/securityalert/1367
SecurityTrackerID:1016669
Solutions
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.