Dynamic variable evaluation vulnerability in index.php in Stadtaus Guestbook Script 1.7 and earlier, when register_globals is enabled, allows remote attackers to modify arbitrary program variables via parameters, which are evaluated as PHP variable variables, as demonstrated by performing PHP remote file inclusion using the include_files array parameter.
References
Configurations
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://retrogod.altervista.org/gbs_17_xpl_pl.html - | |
References | () http://secunia.com/advisories/19957 - | |
References | () http://www.securityfocus.com/bid/17845 - | |
References | () http://www.stadtaus.com/forum/t-2600.html - | |
References | () http://www.vupen.com/english/advisories/2006/1660 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26252 - |
Information
Published : 2006-05-03 10:02
Updated : 2024-11-21 00:10
NVD link : CVE-2006-2158
Mitre link : CVE-2006-2158
CVE.ORG link : CVE-2006-2158
JSON object : View
Products Affected
stadtaus
- guestbook_script
CWE