PHP remote file inclusion vulnerability in archive.php in Fantastic News 2.1.2 allows remote attackers to include arbitrary files via the CONFIG[script_path] variable. NOTE: 2.1.4 was also reported to be vulnerable.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21807 - Vendor Advisory | |
References | () http://secunia.com/advisories/23519 - | |
References | () http://sx02.coresec.de/advisories/152.txt - | |
References | () http://www.securityfocus.com/bid/16985 - | |
References | () http://www.securityfocus.com/bid/21796 - | |
References | () http://www.vupen.com/english/advisories/2006/0826 - | |
References | () http://www.vupen.com/english/advisories/2006/3513 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25064 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31121 - | |
References | () https://www.exploit-db.com/exploits/3027 - |
Information
Published : 2006-03-10 11:02
Updated : 2025-04-03 01:03
NVD link : CVE-2006-1154
Mitre link : CVE-2006-1154
CVE.ORG link : CVE-2006-1154
JSON object : View
Products Affected
fscripts
- fantastic_news
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')