Vulnerabilities > CVE-2006-2745 - Remote File Include vulnerability in Facile Interactive web Facile Interactive web 0.8.41
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple PHP remote file inclusion vulnerabilities in F@cile Interactive Web 0.8.5 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) pathfile parameter in (a) p-editpage.php and (b) p-editbox.php, and the (2) mytheme and (3) myskin parameters in multiple "p-themes" index.inc.php files including (c) lowgraphic, (d) classic, (e) puzzle, (f) simple, and (g) ciao. Successful exploitation requires that "register_globals" is enabled.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | F@cile Interactive Web <= 0.8x Remote (Include / XSS) Vulnerabilities. CVE-2006-2744,CVE-2006-2745,CVE-2006-2746. Webapps exploit for php platform |
id | EDB-ID:1841 |
last seen | 2016-01-31 |
modified | 2006-05-28 |
published | 2006-05-28 |
reporter | nukedx |
source | https://www.exploit-db.com/download/1841/ |
title | F@cile Interactive Web <= 0.8x Remote Include / XSS Vulnerabilities |
References
- http://secunia.com/advisories/20358
- http://securityreason.com/securityalert/1010
- http://www.nukedx.com/?getxpl=35
- http://www.nukedx.com/?viewdoc=35
- http://www.osvdb.org/26101
- http://www.osvdb.org/26102
- http://www.osvdb.org/26103
- http://www.securityfocus.com/archive/1/435283/100/0/threaded
- http://www.securityfocus.com/bid/18149
- http://www.vupen.com/english/advisories/2006/2036
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26841
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26854