Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in QnECMS 2.5.6 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the adminfolderpath parameter to (1) headerscripts.php, (2) footerhome.php, and (3) footermain.php in admin/include/; (4) photogallery/headerscripts.php; and (5) footerhome.php, (6) footermain.php, (7) headermain.php, (8) sitemapfooter.php, and (9) sitemapheader.php in templates/.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qnecms | Qnecms | <= 2.5.6 |
References
- http://advisories.echo.or.id/adv/adv53-K-159-2006.txt
- http://secunia.com/advisories/22623Vendor Advisory
- http://www.osvdb.org/30117
- http://www.osvdb.org/30118
- http://www.osvdb.org/30119
- http://www.osvdb.org/30120
- http://www.osvdb.org/30121
- http://www.osvdb.org/30122
- http://www.osvdb.org/30123
- http://www.osvdb.org/30124
- http://www.osvdb.org/30125
- http://www.securityfocus.com/archive/1/450056/100/0/threaded
- http://www.securityfocus.com/archive/1/452356/100/0/threaded
- http://www.securityfocus.com/bid/20801
- http://www.vupen.com/english/advisories/2006/4258
FAQ
What is CVE-2006-5627?
CVE-2006-5627 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple PHP remote file inclusion vulnerabilities in QnECMS 2.5.6 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the adminfolderpath parameter to (1) headerscripts.php,...
How severe is CVE-2006-5627?
CVE-2006-5627 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5627?
Check the references section above for vendor advisories and patch information. Affected products include: Qnecms Qnecms.