Vulnerability Description
PHP remote file inclusion vulnerability in raidenhttpd-admin/slice/check.php in RaidenHTTPD 1.1.49, when register_globals and WebAdmin is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the SoftParserFileXml parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Raidenhttpd | Raidenhttpd | <= 1.1.49 |
References
- http://secunia.com/advisories/21833Vendor Advisory
- http://www.securityfocus.com/bid/19918Exploit
- http://www.vupen.com/english/advisories/2006/3542
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28821
- https://www.exploit-db.com/exploits/2328
- http://secunia.com/advisories/21833Vendor Advisory
- http://www.securityfocus.com/bid/19918Exploit
- http://www.vupen.com/english/advisories/2006/3542
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28821
- https://www.exploit-db.com/exploits/2328
FAQ
What is CVE-2006-4723?
CVE-2006-4723 is a vulnerability with a CVSS score of 5.1 (MEDIUM). PHP remote file inclusion vulnerability in raidenhttpd-admin/slice/check.php in RaidenHTTPD 1.1.49, when register_globals and WebAdmin is enabled, allows remote attackers to execute arbitrary PHP code...
How severe is CVE-2006-4723?
CVE-2006-4723 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4723?
Check the references section above for vendor advisories and patch information. Affected products include: Raidenhttpd Raidenhttpd.