CVE-2006-3193

Multiple PHP remote file inclusion vulnerabilities in Grayscale BandSite CMS 1.1.1, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) includes/content/contact_content.php; multiple files in adminpanel/includes/add_forms/ including (2) addbioform.php, (3) addfliersform.php, (4) addgenmerchform.php, (5) addinterviewsform.php, (6) addlinksform.php, (7) addlyricsform.php, (8) addmembioform.php, (9) addmerchform.php, (10) addmerchpicform.php, (11) addnewsform.php, (12) addphotosform.php, (13) addreleaseform.php, (14) addreleasepicform.php, (15) addrelmerchform.php, (16) addreviewsform.php, (17) addshowsform.php, (18) addwearmerchform.php; (19) adminpanel/includes/mailinglist/disphtmltbl.php, and (20) adminpanel/includes/mailinglist/dispxls.php.
References
Link Resource
http://secunia.com/advisories/20768 Vendor Advisory
http://sourceforge.net/project/shownotes.php?release_id=428062
http://www.osvdb.org/27233
http://www.osvdb.org/27234
http://www.osvdb.org/27235
http://www.osvdb.org/27236
http://www.osvdb.org/27237
http://www.osvdb.org/27238
http://www.osvdb.org/27239
http://www.osvdb.org/27240 Exploit
http://www.osvdb.org/27241 Exploit
http://www.osvdb.org/27242 Exploit
http://www.osvdb.org/27243 Exploit
http://www.osvdb.org/27244 Exploit
http://www.osvdb.org/27245 Exploit
http://www.osvdb.org/27246
http://www.osvdb.org/27247 Exploit
http://www.osvdb.org/27248 Exploit
http://www.osvdb.org/27249 Exploit
http://www.osvdb.org/27250 Exploit
http://www.osvdb.org/27251 Exploit
http://www.osvdb.org/27252 Exploit
http://www.securityfocus.com/bid/18555
http://www.vupen.com/english/advisories/2006/2462 Vendor Advisory
https://www.exploit-db.com/exploits/1933
http://secunia.com/advisories/20768 Vendor Advisory
http://sourceforge.net/project/shownotes.php?release_id=428062
http://www.osvdb.org/27233
http://www.osvdb.org/27234
http://www.osvdb.org/27235
http://www.osvdb.org/27236
http://www.osvdb.org/27237
http://www.osvdb.org/27238
http://www.osvdb.org/27239
http://www.osvdb.org/27240 Exploit
http://www.osvdb.org/27241 Exploit
http://www.osvdb.org/27242 Exploit
http://www.osvdb.org/27243 Exploit
http://www.osvdb.org/27244 Exploit
http://www.osvdb.org/27245 Exploit
http://www.osvdb.org/27246
http://www.osvdb.org/27247 Exploit
http://www.osvdb.org/27248 Exploit
http://www.osvdb.org/27249 Exploit
http://www.osvdb.org/27250 Exploit
http://www.osvdb.org/27251 Exploit
http://www.osvdb.org/27252 Exploit
http://www.securityfocus.com/bid/18555
http://www.vupen.com/english/advisories/2006/2462 Vendor Advisory
https://www.exploit-db.com/exploits/1933
Configurations

Configuration 1 (hide)

cpe:2.3:a:grayscale:bandsite_cms:1.1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:13

Type Values Removed Values Added
References () http://secunia.com/advisories/20768 - Vendor Advisory () http://secunia.com/advisories/20768 - Vendor Advisory
References () http://sourceforge.net/project/shownotes.php?release_id=428062 - () http://sourceforge.net/project/shownotes.php?release_id=428062 -
References () http://www.osvdb.org/27233 - () http://www.osvdb.org/27233 -
References () http://www.osvdb.org/27234 - () http://www.osvdb.org/27234 -
References () http://www.osvdb.org/27235 - () http://www.osvdb.org/27235 -
References () http://www.osvdb.org/27236 - () http://www.osvdb.org/27236 -
References () http://www.osvdb.org/27237 - () http://www.osvdb.org/27237 -
References () http://www.osvdb.org/27238 - () http://www.osvdb.org/27238 -
References () http://www.osvdb.org/27239 - () http://www.osvdb.org/27239 -
References () http://www.osvdb.org/27240 - Exploit () http://www.osvdb.org/27240 - Exploit
References () http://www.osvdb.org/27241 - Exploit () http://www.osvdb.org/27241 - Exploit
References () http://www.osvdb.org/27242 - Exploit () http://www.osvdb.org/27242 - Exploit
References () http://www.osvdb.org/27243 - Exploit () http://www.osvdb.org/27243 - Exploit
References () http://www.osvdb.org/27244 - Exploit () http://www.osvdb.org/27244 - Exploit
References () http://www.osvdb.org/27245 - Exploit () http://www.osvdb.org/27245 - Exploit
References () http://www.osvdb.org/27246 - () http://www.osvdb.org/27246 -
References () http://www.osvdb.org/27247 - Exploit () http://www.osvdb.org/27247 - Exploit
References () http://www.osvdb.org/27248 - Exploit () http://www.osvdb.org/27248 - Exploit
References () http://www.osvdb.org/27249 - Exploit () http://www.osvdb.org/27249 - Exploit
References () http://www.osvdb.org/27250 - Exploit () http://www.osvdb.org/27250 - Exploit
References () http://www.osvdb.org/27251 - Exploit () http://www.osvdb.org/27251 - Exploit
References () http://www.osvdb.org/27252 - Exploit () http://www.osvdb.org/27252 - Exploit
References () http://www.securityfocus.com/bid/18555 - () http://www.securityfocus.com/bid/18555 -
References () http://www.vupen.com/english/advisories/2006/2462 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2462 - Vendor Advisory
References () https://www.exploit-db.com/exploits/1933 - () https://www.exploit-db.com/exploits/1933 -

Information

Published : 2006-06-23 00:02

Updated : 2024-11-21 00:13


NVD link : CVE-2006-3193

Mitre link : CVE-2006-3193

CVE.ORG link : CVE-2006-3193


JSON object : View

Products Affected

grayscale

  • bandsite_cms
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')