Vulnerability Description
PHP remote file inclusion vulnerability in mybic_server.php in Jim Plush My-BIC 0.6.5 allows remote attackers to execute arbitrary PHP code via a URL in the INC_PATH parameter, a different vector than CVE-2006-5089. NOTE: this issue is disputed by CVE and third party researchers because INC_PATH is a constant
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jim Plush | My-Bic | 0.6.5 |
References
- http://attrition.org/pipermail/vim/2006-November/001127.htmlExploit
- http://osvdb.org/31542
- http://securityreason.com/securityalert/1891
- http://www.securityfocus.com/archive/1/451876/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30361
- http://attrition.org/pipermail/vim/2006-November/001127.htmlExploit
- http://osvdb.org/31542
- http://securityreason.com/securityalert/1891
- http://www.securityfocus.com/archive/1/451876/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30361
FAQ
What is CVE-2006-6018?
CVE-2006-6018 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in mybic_server.php in Jim Plush My-BIC 0.6.5 allows remote attackers to execute arbitrary PHP code via a URL in the INC_PATH parameter, a different vector than...
How severe is CVE-2006-6018?
CVE-2006-6018 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6018?
Check the references section above for vendor advisories and patch information. Affected products include: Jim Plush My-Bic.