CVE-2006-5764

PHP remote file inclusion vulnerability in contact.php in Free File Hosting 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: this issue was later reported for the "File Upload System" which is a component of Free File Hosting.
Configurations

Configuration 1 (hide)

cpe:2.3:a:free_php_scripts:free_file_hosting:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:20

Type Values Removed Values Added
References () http://www.attrition.org/pipermail/vim/2007-March/001473.html - () http://www.attrition.org/pipermail/vim/2007-March/001473.html -
References () http://www.securityfocus.com/archive/1/463707/100/0/threaded - () http://www.securityfocus.com/archive/1/463707/100/0/threaded -
References () http://www.securityfocus.com/bid/23118 - () http://www.securityfocus.com/bid/23118 -
References () http://www.vupen.com/english/advisories/2006/4228 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4228 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29874 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29874 -

Information

Published : 2006-11-06 23:07

Updated : 2024-11-21 00:20


NVD link : CVE-2006-5764

Mitre link : CVE-2006-5764

CVE.ORG link : CVE-2006-5764


JSON object : View

Products Affected

free_php_scripts

  • free_file_hosting
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')