Vulnerability Description
PHP remote file inclusion vulnerability in ToendaCMS 1.0.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the tcms_administer_site parameter to an unspecified script, probably index.php. NOTE: this issue has been disputed by a third party, who states that $tcms_administer_site is initialized to a constant value within index.php
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Toenda Software Development | Toendacms | 1.0 |
References
- http://www.osvdb.org/29358
- http://www.securityfocus.com/archive/1/443918/100/0/threaded
- http://www.securityfocus.com/archive/1/444236/100/0/threaded
- http://www.securityfocus.com/bid/19626Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28491
- http://www.osvdb.org/29358
- http://www.securityfocus.com/archive/1/443918/100/0/threaded
- http://www.securityfocus.com/archive/1/444236/100/0/threaded
- http://www.securityfocus.com/bid/19626Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28491
FAQ
What is CVE-2006-4349?
CVE-2006-4349 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in ToendaCMS 1.0.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the tcms_administer_site parameter to an unspecified script, p...
How severe is CVE-2006-4349?
CVE-2006-4349 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4349?
Check the references section above for vendor advisories and patch information. Affected products include: Toenda Software Development Toendacms.