Vulnerability Description
includes/common.php in RunCMS 1.2 and earlier calls the extract function with EXTR_OVERWRITE on HTTP POST variables, which allows remote attackers to overwrite arbitrary variables, possibly allowing execution of arbitrary code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Runcms | Runcms | 1.1 |
References
- http://secunia.com/advisories/16514Vendor Advisory
- http://www.gulftech.org/?node=research&article_id=00094-08192005Vendor Advisory
- http://secunia.com/advisories/16514Vendor Advisory
- http://www.gulftech.org/?node=research&article_id=00094-08192005Vendor Advisory
FAQ
What is CVE-2005-2691?
CVE-2005-2691 is a vulnerability with a CVSS score of 7.5 (HIGH). includes/common.php in RunCMS 1.2 and earlier calls the extract function with EXTR_OVERWRITE on HTTP POST variables, which allows remote attackers to overwrite arbitrary variables, possibly allowing e...
How severe is CVE-2005-2691?
CVE-2005-2691 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2691?
Check the references section above for vendor advisories and patch information. Affected products include: Runcms Runcms.