Vulnerability Description
action_public/search.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote attackers to execute arbitrary PHP code via a search with a crafted value of the lastdate parameter, which alters the behavior of a regular expression to add a "#e" (execute) modifier.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Invision Power Services | Invision Power Board | 2.1.5_2006-03-08 |
References
- http://forums.invisionpower.com/index.php?showtopic=213374Patch
- http://secunia.com/advisories/19830
- http://securityreason.com/securityalert/796
- http://www.osvdb.org/25005
- http://www.securityfocus.com/archive/1/431990/100/0/threaded
- http://www.securityfocus.com/archive/1/432226/100/0/threaded
- http://www.securityfocus.com/archive/1/432451/100/0/threaded
- http://www.securityfocus.com/archive/1/439607/100/0/threaded
- http://www.securityfocus.com/bid/17695
- http://www.vupen.com/english/advisories/2006/1534
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26070
- http://forums.invisionpower.com/index.php?showtopic=213374Patch
- http://secunia.com/advisories/19830
- http://securityreason.com/securityalert/796
- http://www.osvdb.org/25005
FAQ
What is CVE-2006-2059?
CVE-2006-2059 is a vulnerability with a CVSS score of 5.0 (MEDIUM). action_public/search.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote attackers to execute arbitrary PHP code via a search with a crafted value of the lastdate parameter...
How severe is CVE-2006-2059?
CVE-2006-2059 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2059?
Check the references section above for vendor advisories and patch information. Affected products include: Invision Power Services Invision Power Board.