Vulnerabilities > CVE-2006-5588 - Remote File Include vulnerability in CMS Faethon Mainpath Parameter

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
cms-faethon
exploit available

Summary

Multiple PHP remote file inclusion vulnerabilities in CMS Faethon 2.0 Ultimate and earlier, when register_globals and magic_quotes_gpc are enabled, allow remote attackers to execute arbitrary PHP code via a URL in the mainpath parameter to (1) includes/rss-reader.php or (2) admin/config.php, different vectors than CVE-2006-3185.

Vulnerable Configurations

Part Description Count
Application
Cms_Faethon
1

Exploit-Db

descriptionCMS Faethon <= 2.0 (mainpath) Remote File Include Exploit. CVE-2006-5588. Webapps exploit for php platform
fileexploits/php/webapps/2632.pl
idEDB-ID:2632
last seen2016-01-31
modified2006-10-24
platformphp
port
published2006-10-24
reporterr0ut3r
sourcehttps://www.exploit-db.com/download/2632/
titleCMS Faethon <= 2.0 mainpath Remote File Include Exploit
typewebapps