Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in interact 2.2, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) CONFIG[BASE_PATH] parameter in (a) admin/autoprompter.php and (b) includes/common.inc.php, and the (2) CONFIG[LANGUAGE_CPATH] parameter in (c) admin/autoprompter.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Interact Learning Community Environment | Interact | 2.2 |
References
- http://securityreason.com/securityalert/1471
- http://www.securityfocus.com/archive/1/444526/100/0/threaded
- http://www.securityfocus.com/bid/19739Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28485
- https://www.exploit-db.com/exploits/2218
- http://securityreason.com/securityalert/1471
- http://www.securityfocus.com/archive/1/444526/100/0/threaded
- http://www.securityfocus.com/bid/19739Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28485
- https://www.exploit-db.com/exploits/2218
FAQ
What is CVE-2006-4448?
CVE-2006-4448 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Multiple PHP remote file inclusion vulnerabilities in interact 2.2, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) CONFIG[BASE_PATH] parame...
How severe is CVE-2006-4448?
CVE-2006-4448 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4448?
Check the references section above for vendor advisories and patch information. Affected products include: Interact Learning Community Environment Interact.