Vulnerabilities > CVE-2006-5727 - Remote File Include vulnerability in Sazcart 1.5
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
PHP remote file inclusion vulnerability in admin/controls/cart.php in sazcart 1.5 allows remote attackers to execute arbitrary PHP code via the (1) _saz[settings][shippingfolder] and (2) _saz[settings][taxfolder] parameters. Successful exploitation requires that "register_globals" is enabled.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | SazCart <= 1.5 (cart.php) Remote File Include Vulnerability. CVE-2006-5727. Webapps exploit for php platform |
file | exploits/php/webapps/2718.txt |
id | EDB-ID:2718 |
last seen | 2016-01-31 |
modified | 2006-11-04 |
platform | php |
port | |
published | 2006-11-04 |
reporter | IbnuSina |
source | https://www.exploit-db.com/download/2718/ |
title | SazCart <= 1.5 cart.php Remote File Include Vulnerability |
type | webapps |
References
- http://secunia.com/advisories/22708
- http://www.attrition.org/pipermail/vim/2007-January/001232.html
- http://www.osvdb.org/30194
- http://www.securityfocus.com/archive/1/456542/100/0/threaded
- http://www.securityfocus.com/bid/20922
- http://www.vupen.com/english/advisories/2006/4343
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30013
- https://www.exploit-db.com/exploits/2718