Vulnerabilities > CVE-2006-5588 - Unspecified vulnerability in CMS Faethon CMS Faethon
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cms-faethon
exploit available
Summary
Multiple PHP remote file inclusion vulnerabilities in CMS Faethon 2.0 Ultimate and earlier, when register_globals and magic_quotes_gpc are enabled, allow remote attackers to execute arbitrary PHP code via a URL in the mainpath parameter to (1) includes/rss-reader.php or (2) admin/config.php, different vectors than CVE-2006-3185.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | CMS Faethon <= 2.0 (mainpath) Remote File Include Exploit. CVE-2006-5588. Webapps exploit for php platform |
file | exploits/php/webapps/2632.pl |
id | EDB-ID:2632 |
last seen | 2016-01-31 |
modified | 2006-10-24 |
platform | php |
port | |
published | 2006-10-24 |
reporter | r0ut3r |
source | https://www.exploit-db.com/download/2632/ |
title | CMS Faethon <= 2.0 mainpath Remote File Include Exploit |
type | webapps |
References
- http://cmsfaethon.org/news.php#8
- http://cmsfaethon.org/news.php#8
- http://dev.cmsfaethon.org/tracker/?do=details&id=43
- http://dev.cmsfaethon.org/tracker/?do=details&id=43
- http://www.securityfocus.com/bid/20705
- http://www.securityfocus.com/bid/20705
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29757
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29757
- https://www.exploit-db.com/exploits/2632
- https://www.exploit-db.com/exploits/2632