Vulnerability Description
PHP remote file inclusion vulnerability in index.php in SpoonLabs Vivvo Article Management CMS (aka phpWordPress) 3.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the classified_path parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Spoonlabs | Vivvo Article Management Cms | <= 3.25 |
References
- http://secunia.com/advisories/21855ExploitPatchVendor Advisory
- http://securitydot.net/xpl/exploits/vulnerabilities/articles/1467/exploit.htmlExploit
- http://www.securityfocus.com/bid/84147
- http://www.vupen.com/english/advisories/2006/3548
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28834
- https://www.exploit-db.com/exploits/2339
- http://secunia.com/advisories/21855ExploitPatchVendor Advisory
- http://securitydot.net/xpl/exploits/vulnerabilities/articles/1467/exploit.htmlExploit
- http://www.securityfocus.com/bid/84147
- http://www.vupen.com/english/advisories/2006/3548
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28834
- https://www.exploit-db.com/exploits/2339
FAQ
What is CVE-2006-4714?
CVE-2006-4714 is a vulnerability with a CVSS score of 5.1 (MEDIUM). PHP remote file inclusion vulnerability in index.php in SpoonLabs Vivvo Article Management CMS (aka phpWordPress) 3.2 and earlier, when register_globals is enabled, allows remote attackers to execute ...
How severe is CVE-2006-4714?
CVE-2006-4714 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4714?
Check the references section above for vendor advisories and patch information. Affected products include: Spoonlabs Vivvo Article Management Cms.