Vulnerability Description
PHP remote file inclusion vulnerability in includes/mx_common.php in the CalSnails Module for MxBB Portal 1.06 allows remote attackers to execute arbitrary PHP code via a URL in the module_root_path parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mxbb | Calsnails Module | 1.06 |
References
- http://secunia.com/advisories/22931ExploitVendor Advisory
- http://www.securityfocus.com/archive/1/452142/100/0/threaded
- http://www.securityfocus.com/bid/21143Exploit
- http://www.vupen.com/english/advisories/2006/4612
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30369
- https://www.exploit-db.com/exploits/2799
- http://secunia.com/advisories/22931ExploitVendor Advisory
- http://www.securityfocus.com/archive/1/452142/100/0/threaded
- http://www.securityfocus.com/bid/21143Exploit
- http://www.vupen.com/english/advisories/2006/4612
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30369
- https://www.exploit-db.com/exploits/2799
FAQ
What is CVE-2006-6065?
CVE-2006-6065 is a vulnerability with a CVSS score of 5.1 (MEDIUM). PHP remote file inclusion vulnerability in includes/mx_common.php in the CalSnails Module for MxBB Portal 1.06 allows remote attackers to execute arbitrary PHP code via a URL in the module_root_path p...
How severe is CVE-2006-6065?
CVE-2006-6065 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6065?
Check the references section above for vendor advisories and patch information. Affected products include: Mxbb Calsnails Module.