PHP remote file inclusion vulnerability in sipssys/code/box.inc.php in Haakon Nilsen simple, integrated publishing system (SIPS) 0.3.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the config[sipssys] parameter. NOTE: the product's documentation recommends placing the affected file outside of the web root, so the scope of issue is limited to admins who do not, or cannot, follow this recommendation.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/1549 - | |
References | () http://sips.cvs.sourceforge.net/sips/sips/sipssys/code/box.inc.php?revision=1.9&view=markup - | |
References | () http://www.attrition.org/pipermail/vim/2007-February/001268.html - | |
References | () http://www.securityfocus.com/archive/1/445770/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19945 - Exploit | |
References | () https://www.exploit-db.com/exploits/3245 - |
Information
Published : 2006-09-13 22:07
Updated : 2024-11-21 00:16
NVD link : CVE-2006-4733
Mitre link : CVE-2006-4733
CVE.ORG link : CVE-2006-4733
JSON object : View
Products Affected
sips
- sips
CWE