Vulnerability Description
Remote file inclusion vulnerability in Contenido CMS allows remote attackers to execute arbitrary PHP code via a URL in the contenido_path parameter to (1) cms/dbfs.php or (2) cms/front_content.php. NOTE: CVE disputes this issue for version 4.6.15, because $contenido_path is set to a static value
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Contenido | Contendio | 4.6.15 |
References
- http://securityreason.com/securityalert/1739
- http://www.attrition.org/pipermail/vim/2006-October/001084.htmlExploit
- http://www.securityfocus.com/archive/1/448549/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29549
- http://securityreason.com/securityalert/1739
- http://www.attrition.org/pipermail/vim/2006-October/001084.htmlExploit
- http://www.securityfocus.com/archive/1/448549/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29549
FAQ
What is CVE-2006-5380?
CVE-2006-5380 is a vulnerability with a CVSS score of 7.5 (HIGH). Remote file inclusion vulnerability in Contenido CMS allows remote attackers to execute arbitrary PHP code via a URL in the contenido_path parameter to (1) cms/dbfs.php or (2) cms/front_content.php. ...
How severe is CVE-2006-5380?
CVE-2006-5380 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5380?
Check the references section above for vendor advisories and patch information. Affected products include: Contenido Contendio.