Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Visual Shapers ezContents 2.0.3 allow remote attackers to execute arbitrary PHP code via an empty GLOBALS[rootdp] parameter and an ftps URL in the (1) GLOBALS[admin_home] parameter in (a) diary/event_list.php, (b) gallery/gallery_summary.php, (c) guestbook/showguestbook.php, (d) links/showlinks.php, and (e) reviews/review_summary.php; and the (2) GLOBALS[language_home] parameter in (f) calendar/calendar.php, (g) news/shownews.php, (h) poll/showpoll.php, (i) search/search.php, (j) toprated/toprated.php, and (k) whatsnew/whatsnew.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Visualshapers | Ezcontents | 2.0.3 |
References
- http://secunia.com/advisories/21703ExploitVendor Advisory
- http://securityreason.com/securityalert/1479
- http://securitytracker.com/id?1016770
- http://www.osvdb.org/28321Exploit
- http://www.osvdb.org/28322Exploit
- http://www.osvdb.org/28323Exploit
- http://www.osvdb.org/28324Exploit
- http://www.osvdb.org/28325Exploit
- http://www.osvdb.org/28326Exploit
- http://www.osvdb.org/28327Exploit
- http://www.osvdb.org/28328Exploit
- http://www.osvdb.org/28329Exploit
- http://www.osvdb.org/28330Exploit
- http://www.osvdb.org/28331Exploit
- http://www.securityfocus.com/archive/1/444779/100/0/threaded
FAQ
What is CVE-2006-4477?
CVE-2006-4477 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple PHP remote file inclusion vulnerabilities in Visual Shapers ezContents 2.0.3 allow remote attackers to execute arbitrary PHP code via an empty GLOBALS[rootdp] parameter and an ftps URL in the...
How severe is CVE-2006-4477?
CVE-2006-4477 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4477?
Check the references section above for vendor advisories and patch information. Affected products include: Visualshapers Ezcontents.