Vulnerabilities > CVE-2006-6426 - Remote Security vulnerability in ThinkEdit
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
PHP remote file inclusion vulnerability in design/thinkedit/render.php in ThinkEdit 1.9.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the template_file parameter. Successful exploitation requires that "register_globals" is enabled. This vulnerability is addressed in the following product release: ThinkEdit, ThinkEdit, 1.9.2
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | ThinkEdit 1.9.2 (render.php) Remote File Inclusion Vulnerability. CVE-2006-6426. Webapps exploit for php platform |
file | exploits/php/webapps/2898.txt |
id | EDB-ID:2898 |
last seen | 2016-01-31 |
modified | 2006-12-08 |
platform | php |
port | |
published | 2006-12-08 |
reporter | r0ut3r |
source | https://www.exploit-db.com/download/2898/ |
title | ThinkEdit 1.9.2 render.php Remote File Inclusion Vulnerability |
type | webapps |
References
- http://secunia.com/advisories/23279
- http://securitytracker.com/id?1017359
- http://svn.berlios.de/viewcvs/thinkedit/trunk/design/thinkedit/render.php?rev=321&r1=230&r2=321
- http://www.vupen.com/english/advisories/2006/4906
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30772
- https://www.exploit-db.com/exploits/2898