Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Published: 2006-09-06
Updated: 2024-11-21
Summary
Multiple PHP remote file inclusion vulnerabilities in Yet Another Community System (YACS) CMS 6.6.1 allow remote attackers to execute arbitrary PHP code via a URL in the context[path_to_root] parameter in (1) articles/populate.php, (2) categories/category.php, (3) categories/populate.php, (4) comments/populate.php, (5) files/file.php, (6) sections/section.php, (7) sections/populate.php, (8) tables/populate.php, (9) users/user.php, and (10) users/populate.php. The articles/article.php vector is covered by CVE-2006-4532.
Vulnerable Configurations
Exploit-Db
description | YACS CMS <= 6.6.1 context[path_to_root] Remote File Include Vuln. CVE-2006-4532,CVE-2006-4559. Webapps exploit for php platform |
file | exploits/php/webapps/2282.txt |
id | EDB-ID:2282 |
last seen | 2016-01-31 |
modified | 2006-08-31 |
platform | php |
port | |
published | 2006-08-31 |
reporter | MATASANOS |
source | https://www.exploit-db.com/download/2282/ |
title | YACS CMS <= 6.6.1 - contextpath_to_root Remote File Include Vuln |
type | webapps |