Vulnerabilities > CVE-2006-4075 - Remote File Include vulnerability in Docpile 'Init_path' Parameter

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
wim-fleischhauer
exploit available

Summary

Multiple PHP remote file inclusion vulnerabilities in Wim Fleischhauer docpile: wim's edition (docpile:we) 0.2.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the INIT_PATH parameter to (1) lib/folder.class.php, (2) lib/email.inc.php, (3) lib/document.class.php or (4) lib/auth.inc.php. Successful exploitation requires that "register_globals" is enabled.

Vulnerable Configurations

Part Description Count
Application
Wim_Fleischhauer
1

Exploit-Db

descriptiondocpile:we <= 0.2.2 (INIT_PATH) Remote File Inclusion Vulnerabilities. CVE-2006-4075. Webapps exploit for php platform
fileexploits/php/webapps/2146.txt
idEDB-ID:2146
last seen2016-01-31
modified2006-08-08
platformphp
port
published2006-08-08
reporterMehmet Ince
sourcehttps://www.exploit-db.com/download/2146/
titledocpile:we <= 0.2.2 INIT_PATH Remote File Inclusion Vulnerabilities
typewebapps