Vulnerabilities > CVE-2006-5244 - Remote File Include vulnerability in Easy Blog Doc_Directory Parameter

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
opendock
exploit available

Summary

Multiple PHP remote file inclusion vulnerabilities in OpenDock Easy Blog 1.4 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the doc_directory parameter in (1) down_stat.php, (2) file.php, (3) find_file.php, (4) lib_read_file.php, and (5) lib_form_file.php in sw/lib_up_file; (6) find_comment.php, (7) comment.php, and (8) lib_comment.php in sw/lib_comment/; (9) sw/lib_find/find.php; and other unspecified vectors. Successful exploitation requires that "register_globals" is enabled.

Vulnerable Configurations

Part Description Count
Application
Opendock
1

Exploit-Db

  • descriptionOpenDock Easy Blog. CVE-2006-5244. Webapps exploit for php platform
    fileexploits/php/webapps/2495.txt
    idEDB-ID:2495
    last seen2016-01-31
    modified2006-10-09
    platformphp
    port
    published2006-10-09
    reporterthe_day
    sourcehttps://www.exploit-db.com/download/2495/
    titleOpenDock Easy Blog <= 1.4 - doc_directory File Include Vulnerabilities
    typewebapps
  • descriptionOpenDock Easy Doc. CVE-2006-5243,CVE-2006-5244. Webapps exploit for php platform
    idEDB-ID:2494
    last seen2016-01-31
    modified2006-10-09
    published2006-10-09
    reporterthe_day
    sourcehttps://www.exploit-db.com/download/2494/
    titleOpenDock Easy Doc <= 1.4 - doc_directory File Include Vulnerabilities