Vulnerabilities > CVE-2006-4052 - Remote Security vulnerability in [Extra BID] Php Simple Shop
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple PHP remote file inclusion vulnerabilities in Turnkey Web Tools PHP Simple Shop 2.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the abs_path parameter to (1) admin/index.php, (2) admin/adminindex.php, (3) admin/adminglobal.php, (4) admin/login.php, (5) admin/menu.php or (6) admin/header.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | PHP Simple Shop <= 2.0 (abs_path) Remote File Inclusion Vulnerability. CVE-2006-4052. Webapps exploit for php platform |
file | exploits/php/webapps/2119.txt |
id | EDB-ID:2119 |
last seen | 2016-01-31 |
modified | 2006-08-07 |
platform | php |
port | |
published | 2006-08-07 |
reporter | Matdhule |
source | https://www.exploit-db.com/download/2119/ |
title | PHP Simple Shop <= 2.0 abs_path Remote File Inclusion Vulnerability |
type | webapps |
References
- http://advisories.echo.or.id/adv/adv44-matdhule-2006.txt
- http://secunia.com/advisories/21371
- http://securitytracker.com/id?1016644
- http://www.osvdb.org/27800
- http://www.osvdb.org/27801
- http://www.osvdb.org/27802
- http://www.osvdb.org/27803
- http://www.osvdb.org/27804
- http://www.osvdb.org/27805
- http://www.securityfocus.com/archive/1/442422/100/100/threaded
- http://www.vupen.com/english/advisories/2006/3171
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28247
- https://www.exploit-db.com/exploits/2119