CVE-2006-2158

Dynamic variable evaluation vulnerability in index.php in Stadtaus Guestbook Script 1.7 and earlier, when register_globals is enabled, allows remote attackers to modify arbitrary program variables via parameters, which are evaluated as PHP variable variables, as demonstrated by performing PHP remote file inclusion using the include_files array parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:stadtaus:guestbook_script:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://retrogod.altervista.org/gbs_17_xpl_pl.html - () http://retrogod.altervista.org/gbs_17_xpl_pl.html -
References () http://secunia.com/advisories/19957 - () http://secunia.com/advisories/19957 -
References () http://www.securityfocus.com/bid/17845 - () http://www.securityfocus.com/bid/17845 -
References () http://www.stadtaus.com/forum/t-2600.html - () http://www.stadtaus.com/forum/t-2600.html -
References () http://www.vupen.com/english/advisories/2006/1660 - () http://www.vupen.com/english/advisories/2006/1660 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26252 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26252 -

Information

Published : 2006-05-03 10:02

Updated : 2024-11-21 00:10


NVD link : CVE-2006-2158

Mitre link : CVE-2006-2158

CVE.ORG link : CVE-2006-2158


JSON object : View

Products Affected

stadtaus

  • guestbook_script