Vulnerabilities > CVE-2006-4198 - Remote File Include vulnerability in Wheatblog 1.0
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
PHP remote file inclusion vulnerability in includes/session.php in Wheatblog (wB) 1.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the wb_class_dir parameter. Successful exploitation requires that "register_globals" is enabled.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | Wheatblog <= 1.1 (session.php) Remote File Include Vulnerability. CVE-2006-4198. Webapps exploit for php platform |
file | exploits/php/webapps/2174.txt |
id | EDB-ID:2174 |
last seen | 2016-01-31 |
modified | 2006-08-11 |
platform | php |
port | 80 |
published | 2006-08-11 |
reporter | O.U.T.L.A.W |
source | https://www.exploit-db.com/download/2174/ |
title | Wheatblog <= 1.1 session.php Remote File Include Vulnerability |
type | webapps |
References
- http://secunia.com/advisories/25903
- http://securityreason.com/securityalert/1410
- http://secwatch.org/advisories/1015085/
- http://sourceforge.net/forum/forum.php?forum_id=601184
- http://www.securityfocus.com/archive/1/442987/100/0/threaded
- http://www.securityfocus.com/archive/1/472575/100/0/threaded
- http://www.securityfocus.com/bid/19482
- http://www.vupen.com/english/advisories/2007/2405
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28338
- https://www.exploit-db.com/exploits/2174