Vulnerability Description
PHP remote file inclusion vulnerability in 0_admin/modules/Wochenkarte/frontend/index.php in DynCMS 6 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the x_admindir parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dyncms | Dyncms | <= 6 |
References
- http://secunia.com/advisories/21729Vendor Advisory
- http://securitytracker.com/id?1016798
- http://www.securityfocus.com/archive/1/445264/100/0/threaded
- http://www.securityfocus.com/bid/19846Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28717
- https://www.exploit-db.com/exploits/2290
- http://secunia.com/advisories/21729Vendor Advisory
- http://securitytracker.com/id?1016798
- http://www.securityfocus.com/archive/1/445264/100/0/threaded
- http://www.securityfocus.com/bid/19846Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28717
- https://www.exploit-db.com/exploits/2290
FAQ
What is CVE-2006-4589?
CVE-2006-4589 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in 0_admin/modules/Wochenkarte/frontend/index.php in DynCMS 6 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the x_admindir para...
How severe is CVE-2006-4589?
CVE-2006-4589 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4589?
Check the references section above for vendor advisories and patch information. Affected products include: Dyncms Dyncms.