Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in process.php in Vladimir Menshakov buratinable templator (aka bubla) 1.0.0rc2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) bu_dir or (2) bu_config[dir] parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vladimir Menshakov | Buratinable Templator | <= 1.0.0_rc2 |
References
- http://www.securityfocus.com/bid/21793Exploit
- http://www.vupen.com/english/advisories/2006/5195
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31135
- https://www.exploit-db.com/exploits/3026
- http://www.securityfocus.com/bid/21793Exploit
- http://www.vupen.com/english/advisories/2006/5195
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31135
- https://www.exploit-db.com/exploits/3026
FAQ
What is CVE-2006-6809?
CVE-2006-6809 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple PHP remote file inclusion vulnerabilities in process.php in Vladimir Menshakov buratinable templator (aka bubla) 1.0.0rc2 and earlier allow remote attackers to execute arbitrary PHP code via ...
How severe is CVE-2006-6809?
CVE-2006-6809 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6809?
Check the references section above for vendor advisories and patch information. Affected products include: Vladimir Menshakov Buratinable Templator.