Vulnerability Description
PHP remote file inclusion vulnerability in MyBloggie 2.1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the mybloggie_root_path parameter to (1) admin.php or (2) scode.php. NOTE: this issue has been disputed in multiple third party followups, which say that the MyBloggie source code does not demonstrate the issue, so it might be the result of another module. CVE analysis as of 20060605 agrees with the dispute. In addition, scode.php is not part of the MyBloggie distribution
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mywebland | Mybloggie | 2.1.1 |
References
- http://securityreason.com/securityalert/1049
- http://www.securityfocus.com/archive/1/435789/100/0/threaded
- http://www.securityfocus.com/archive/1/435866/100/0/threaded
- http://www.securityfocus.com/archive/1/436124/100/0/threaded
- http://www.securityfocus.com/bid/18241Exploit
- http://securityreason.com/securityalert/1049
- http://www.securityfocus.com/archive/1/435789/100/0/threaded
- http://www.securityfocus.com/archive/1/435866/100/0/threaded
- http://www.securityfocus.com/archive/1/436124/100/0/threaded
- http://www.securityfocus.com/bid/18241Exploit
FAQ
What is CVE-2006-2859?
CVE-2006-2859 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in MyBloggie 2.1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the mybloggie_root_path parameter to (1) admin.php or (2) scod...
How severe is CVE-2006-2859?
CVE-2006-2859 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2859?
Check the references section above for vendor advisories and patch information. Affected products include: Mywebland Mybloggie.