Vulnerabilities > CVE-2006-6426 - Remote Security vulnerability in ThinkEdit

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
thinkedit
exploit available

Summary

PHP remote file inclusion vulnerability in design/thinkedit/render.php in ThinkEdit 1.9.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the template_file parameter. Successful exploitation requires that "register_globals" is enabled. This vulnerability is addressed in the following product release: ThinkEdit, ThinkEdit, 1.9.2

Vulnerable Configurations

Part Description Count
Application
Thinkedit
1

Exploit-Db

descriptionThinkEdit 1.9.2 (render.php) Remote File Inclusion Vulnerability. CVE-2006-6426. Webapps exploit for php platform
fileexploits/php/webapps/2898.txt
idEDB-ID:2898
last seen2016-01-31
modified2006-12-08
platformphp
port
published2006-12-08
reporterr0ut3r
sourcehttps://www.exploit-db.com/download/2898/
titleThinkEdit 1.9.2 render.php Remote File Inclusion Vulnerability
typewebapps