Vulnerability Description
admin/cron.php in eSyndicat Directory 1.2, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include arbitrary files and possibly execute arbitrary PHP code via a null-terminated value in the path_to_config parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Esyndicat | Esyndicat Directory | 1.2 |
References
- http://pridels0.blogspot.com/2006/05/esyndicat-directory-software-local.html
- http://secunia.com/advisories/20218
- http://www.vupen.com/english/advisories/2006/1983
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26663
- http://pridels0.blogspot.com/2006/05/esyndicat-directory-software-local.html
- http://secunia.com/advisories/20218
- http://www.vupen.com/english/advisories/2006/1983
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26663
FAQ
What is CVE-2006-2578?
CVE-2006-2578 is a vulnerability with a CVSS score of 5.1 (MEDIUM). admin/cron.php in eSyndicat Directory 1.2, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include arbitrary files and possibly execute arbitrary PHP code...
How severe is CVE-2006-2578?
CVE-2006-2578 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2578?
Check the references section above for vendor advisories and patch information. Affected products include: Esyndicat Esyndicat Directory.