PHP remote file inclusion vulnerability in misc.php in SH-News 0.93, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the news_cfg[path] parameter.
References
| Link | Resource |
|---|---|
| http://secunia.com/advisories/23524 | Exploit Vendor Advisory |
| http://www.securityfocus.com/bid/21761 | Exploit |
| http://www.vupen.com/english/advisories/2006/5161 | |
| https://www.exploit-db.com/exploits/2984 | |
| http://secunia.com/advisories/23524 | Exploit Vendor Advisory |
| http://www.securityfocus.com/bid/21761 | Exploit |
| http://www.vupen.com/english/advisories/2006/5161 | |
| https://www.exploit-db.com/exploits/2984 |
Configurations
History
21 Nov 2024, 00:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://secunia.com/advisories/23524 - Exploit, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/21761 - Exploit | |
| References | () http://www.vupen.com/english/advisories/2006/5161 - | |
| References | () https://www.exploit-db.com/exploits/2984 - |
Information
Published : 2006-12-28 21:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6801
Mitre link : CVE-2006-6801
CVE.ORG link : CVE-2006-6801
JSON object : View
Products Affected
sh-news
- sh-news
CWE
