Vulnerabilities > CVE-2006-5497 - Unspecified vulnerability in Middlebury College Segue CMS
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
PHP remote file inclusion vulnerability in themes/program/themesettings.inc.php in Segue CMS 1.5.8 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the themesdir parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Segue CMS <= 1.5.8 (themesdir) Remote File Include Vulnerability. CVE-2006-5497,CVE-2006-5722. Webapps exploit for php platform |
file | exploits/php/webapps/2600.txt |
id | EDB-ID:2600 |
last seen | 2016-01-31 |
modified | 2006-10-19 |
platform | php |
port | |
published | 2006-10-19 |
reporter | nuffsaid |
source | https://www.exploit-db.com/download/2600/ |
title | Segue CMS <= 1.5.8 themesdir Remote File Include Vulnerability |
type | webapps |
Nessus
NASL family | CGI abuses |
NASL id | SEGUE_RFI.NASL |
description | The remote web server is running Segue CMS, an open source content management system tailored for educational institutions. The version of Segue CMS installed on the remote host fails to sanitize input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22922 |
published | 2006-10-28 |
reporter | This script is Copyright (C) 2006-2018 Justin Seitz |
source | https://www.tenable.com/plugins/nessus/22922 |
title | Segue CMS themesettings.inc.php themesdir Parameter Remote File Inclusion |
code |
|
References
- http://secunia.com/advisories/22491
- http://secunia.com/advisories/22491
- http://sourceforge.net/forum/forum.php?forum_id=625467
- http://sourceforge.net/forum/forum.php?forum_id=625467
- http://www.osvdb.org/29904
- http://www.osvdb.org/29904
- http://www.securityfocus.com/bid/20640
- http://www.securityfocus.com/bid/20640
- http://www.vupen.com/english/advisories/2006/4122
- http://www.vupen.com/english/advisories/2006/4122
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29692
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29692
- https://www.exploit-db.com/exploits/2600
- https://www.exploit-db.com/exploits/2600