pmwiki.php in PmWiki 2.1 beta 20, with register_globals enabled, allows remote attackers to bypass protection mechanisms that deregister global variables by setting both a GPC variable and a GLOBALS[] variable with the same name, which causes PmWiki to unset the GLOBALS[] variable but not the GPC variable, which creates resultant vulnerabilities such as remote file inclusion and cross-site scripting (XSS).
References
Configurations
History
21 Nov 2024, 00:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0931.html - | |
References | () http://secunia.com/advisories/18634 - Vendor Advisory | |
References | () http://securitytracker.com/id?1015550 - | |
References | () http://www.securityfocus.com/bid/16421 - | |
References | () http://www.ush.it/2006/01/24/pmwiki-multiple-vulnerabilities/ - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/0375 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24366 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24367 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24368 - |
Information
Published : 2006-01-31 11:03
Updated : 2024-11-21 00:06
NVD link : CVE-2006-0479
Mitre link : CVE-2006-0479
CVE.ORG link : CVE-2006-0479
JSON object : View
Products Affected
pmwiki
- pmwiki
CWE