Vulnerabilities > CVE-2006-5627 - Remote File Include vulnerability in QnECMS Adminfolderpath Parameter
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple PHP remote file inclusion vulnerabilities in QnECMS 2.5.6 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the adminfolderpath parameter to (1) headerscripts.php, (2) footerhome.php, and (3) footermain.php in admin/include/; (4) photogallery/headerscripts.php; and (5) footerhome.php, (6) footermain.php, (7) headermain.php, (8) sitemapfooter.php, and (9) sitemapheader.php in templates/.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | QnECMS <= 2.5.6 (adminfolderpath) Remote File Inclusion Exploit. CVE-2006-5627. Webapps exploit for php platform |
file | exploits/php/webapps/2681.txt |
id | EDB-ID:2681 |
last seen | 2016-01-31 |
modified | 2006-10-30 |
platform | php |
port | |
published | 2006-10-30 |
reporter | K-159 |
source | https://www.exploit-db.com/download/2681/ |
title | QnECMS <= 2.5.6 adminfolderpath Remote File Inclusion Exploit |
type | webapps |
References
- http://advisories.echo.or.id/adv/adv53-K-159-2006.txt
- http://secunia.com/advisories/22623
- http://www.osvdb.org/30117
- http://www.osvdb.org/30118
- http://www.osvdb.org/30119
- http://www.osvdb.org/30120
- http://www.osvdb.org/30121
- http://www.osvdb.org/30122
- http://www.osvdb.org/30123
- http://www.osvdb.org/30124
- http://www.osvdb.org/30125
- http://www.securityfocus.com/archive/1/450056/100/0/threaded
- http://www.securityfocus.com/archive/1/452356/100/0/threaded
- http://www.securityfocus.com/bid/20801
- http://www.vupen.com/english/advisories/2006/4258
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29871
- https://www.exploit-db.com/exploits/2681