Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in DCP-Portal SE 6.0 allow remote attackers to execute arbitrary PHP code via a URL in the root parameter in (1) library/lib.php and (2) library/editor/editor.php. NOTE: the same primary issue can be used for full path disclosure with an invalid parameter that reveals the installation path in an error message.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Codeworx Technologies | Dcp-Portal | se_6.0 |
References
- http://securityreason.com/securityalert/1585
- http://www.securityfocus.com/archive/1/437510/100/200/threaded
- http://www.securityfocus.com/archive/1/445996/100/0/threaded
- http://www.securityfocus.com/bid/20024Exploit
- https://www.exploit-db.com/exploits/1905
- http://securityreason.com/securityalert/1585
- http://www.securityfocus.com/archive/1/437510/100/200/threaded
- http://www.securityfocus.com/archive/1/445996/100/0/threaded
- http://www.securityfocus.com/bid/20024Exploit
- https://www.exploit-db.com/exploits/1905
FAQ
What is CVE-2006-4837?
CVE-2006-4837 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple PHP remote file inclusion vulnerabilities in DCP-Portal SE 6.0 allow remote attackers to execute arbitrary PHP code via a URL in the root parameter in (1) library/lib.php and (2) library/edit...
How severe is CVE-2006-4837?
CVE-2006-4837 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4837?
Check the references section above for vendor advisories and patch information. Affected products include: Codeworx Technologies Dcp-Portal.