Vulnerabilities > CVE-2006-5768 - Remote File Include vulnerability in Cyberfolio
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple PHP remote file inclusion vulnerabilities in Cyberfolio 2.0 RC1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the av parameter to (1) msg/view.php, (2) msg/inc_message.php, (3) msg/inc_envoi.php, and (4) admin/incl_voir_compet.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Cyberfolio <= 2.0 RC1 (av) Remote File Include Vulnerabilities. CVE-2006-5768. Webapps exploit for php platform |
file | exploits/php/webapps/2725.txt |
id | EDB-ID:2725 |
last seen | 2016-01-31 |
modified | 2006-11-06 |
platform | php |
port | |
published | 2006-11-06 |
reporter | the_day |
source | https://www.exploit-db.com/download/2725/ |
title | Cyberfolio <= 2.0 RC1 av Remote File Include Vulnerabilities |
type | webapps |
References
- http://advisories.echo.or.id/adv/adv58-theday-2006.txt
- http://marc.info/?l=bugtraq&m=116283724113571&w=2
- http://secunia.com/advisories/22721
- http://securitytracker.com/id?1017175
- http://translate.google.com/translate?hl=en&sl=fr&u=http://www.cyberfolio.org/
- http://www.osvdb.org/30212
- http://www.osvdb.org/displayvuln.php?osvdb_id=30211
- http://www.securityfocus.com/bid/20928
- http://www.vupen.com/english/advisories/2006/4360
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30033
- https://www.exploit-db.com/exploits/2725