Vulnerabilities > CVE-2006-5240 - Remote File Include vulnerability in Docmint Required.php
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
PHP remote file inclusion vulnerability in engine/require.php in Docmint 2.0 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the MY_ENV[BASE_ENGINE_LOC] parameter. Successful exploitation requires that "register_globals" is enabled.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | docmint <= 2.0 (engine/require.php) Remote File Inclusion Exploit. CVE-2006-5240. Webapps exploit for php platform |
file | exploits/php/webapps/2493.pl |
id | EDB-ID:2493 |
last seen | 2016-01-31 |
modified | 2006-10-09 |
platform | php |
port | |
published | 2006-10-09 |
reporter | K-159 |
source | https://www.exploit-db.com/download/2493/ |
title | docmint <= 2.0 engine/require.php Remote File Inclusion Exploit |
type | webapps |
References
- http://advisories.echo.or.id/adv/adv51-K-159-2006.txt
- http://secunia.com/advisories/22343
- http://securityreason.com/securityalert/1709
- http://securitytracker.com/id?1017026
- http://www.docmint.net/index.php?id=54
- http://www.securityfocus.com/archive/1/448013/100/0/threaded
- http://www.securityfocus.com/bid/20409
- http://www.vupen.com/english/advisories/2006/3968
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29390
- https://www.exploit-db.com/exploits/2493