Vulnerability Description
Dynamic variable evaluation vulnerability in index.php in Stadtaus Guestbook Script 1.7 and earlier, when register_globals is enabled, allows remote attackers to modify arbitrary program variables via parameters, which are evaluated as PHP variable variables, as demonstrated by performing PHP remote file inclusion using the include_files array parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stadtaus | Guestbook Script | <= 1.7 |
References
- http://retrogod.altervista.org/gbs_17_xpl_pl.html
- http://secunia.com/advisories/19957
- http://www.securityfocus.com/bid/17845
- http://www.stadtaus.com/forum/t-2600.html
- http://www.vupen.com/english/advisories/2006/1660
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26252
- http://retrogod.altervista.org/gbs_17_xpl_pl.html
- http://secunia.com/advisories/19957
- http://www.securityfocus.com/bid/17845
- http://www.stadtaus.com/forum/t-2600.html
- http://www.vupen.com/english/advisories/2006/1660
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26252
FAQ
What is CVE-2006-2158?
CVE-2006-2158 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Dynamic variable evaluation vulnerability in index.php in Stadtaus Guestbook Script 1.7 and earlier, when register_globals is enabled, allows remote attackers to modify arbitrary program variables via...
How severe is CVE-2006-2158?
CVE-2006-2158 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2158?
Check the references section above for vendor advisories and patch information. Affected products include: Stadtaus Guestbook Script.