Vulnerability Description
PHP remote file inclusion vulnerability in admin/controls/cart.php in sazcart 1.5 allows remote attackers to execute arbitrary PHP code via the (1) _saz[settings][shippingfolder] and (2) _saz[settings][taxfolder] parameters.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sazcart | Sazcart | 1.5 |
References
- http://secunia.com/advisories/22708ExploitVendor Advisory
- http://www.attrition.org/pipermail/vim/2007-January/001232.html
- http://www.osvdb.org/30194
- http://www.securityfocus.com/archive/1/456542/100/0/threaded
- http://www.securityfocus.com/bid/20922
- http://www.vupen.com/english/advisories/2006/4343
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30013
- https://www.exploit-db.com/exploits/2718
- http://secunia.com/advisories/22708ExploitVendor Advisory
- http://www.attrition.org/pipermail/vim/2007-January/001232.html
- http://www.osvdb.org/30194
- http://www.securityfocus.com/archive/1/456542/100/0/threaded
- http://www.securityfocus.com/bid/20922
- http://www.vupen.com/english/advisories/2006/4343
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30013
FAQ
What is CVE-2006-5727?
CVE-2006-5727 is a vulnerability with a CVSS score of 5.1 (MEDIUM). PHP remote file inclusion vulnerability in admin/controls/cart.php in sazcart 1.5 allows remote attackers to execute arbitrary PHP code via the (1) _saz[settings][shippingfolder] and (2) _saz[settings...
How severe is CVE-2006-5727?
CVE-2006-5727 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5727?
Check the references section above for vendor advisories and patch information. Affected products include: Sazcart Sazcart.