|
|||
Rule General Information |
---|
Release Date: | 2019-07-05 | |
Rule Name: | BerliOS Docpile_we folder.class.php INIT_PATH Parameter PHP File Include Vulnerability (CVE-2006-4075) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Multiple PHP remote file inclusion vulnerabilities in Wim Fleischhauer docpile: wim's edition (docpile:we) 0.2.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the INIT_PATH parameter to (1) lib/folder.class.php, (2) lib/email.inc.php, (3) lib/document.class.php or (4) lib/auth.inc.php. | |
Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:19428 ExploitDB:2146 http://securityreason.com/securityalert/1367 SecurityTrackerID:1016669 |
|
Solutions |
---|
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. |