Vulnerability Description
PHP remote file inclusion vulnerability in index.php in MediaSlash Gallery allows remote attackers to execute arbitrary PHP code via a URL in the rub parameter (part of the $page_menu variable).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mediaslash.Com | Mediaslash Gallery | 0 |
References
- http://securityreason.com/securityalert/657
- http://www.osvdb.org/24313
- http://www.securityfocus.com/archive/1/429395/100/0/threaded
- http://www.securityfocus.com/archive/1/434419/100/0/threaded
- http://www.securityfocus.com/bid/17323
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25583
- http://securityreason.com/securityalert/657
- http://www.osvdb.org/24313
- http://www.securityfocus.com/archive/1/429395/100/0/threaded
- http://www.securityfocus.com/archive/1/434419/100/0/threaded
- http://www.securityfocus.com/bid/17323
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25583
FAQ
What is CVE-2006-1573?
CVE-2006-1573 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in index.php in MediaSlash Gallery allows remote attackers to execute arbitrary PHP code via a URL in the rub parameter (part of the $page_menu variable).
How severe is CVE-2006-1573?
CVE-2006-1573 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1573?
Check the references section above for vendor advisories and patch information. Affected products include: Mediaslash.Com Mediaslash Gallery.