Vulnerability Description
Direct static code injection vulnerability in admin.php in PHP-Stats 0.1.9.1b and earlier allows remote attackers to execute arbitrary PHP code via a crafted option_new[report_w_day] parameter in a preferenze action, which can be later accessed via option/php-stats-options.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php-Stats | Php-Stats | <= 0.1.9.1b |
References
- http://secunia.com/advisories/24553Vendor Advisory
- http://www.vupen.com/english/advisories/2007/1004
- https://www.exploit-db.com/exploits/3502
- http://secunia.com/advisories/24553Vendor Advisory
- http://www.vupen.com/english/advisories/2007/1004
- https://www.exploit-db.com/exploits/3502
FAQ
What is CVE-2006-7173?
CVE-2006-7173 is a vulnerability with a CVSS score of 10.0 (HIGH). Direct static code injection vulnerability in admin.php in PHP-Stats 0.1.9.1b and earlier allows remote attackers to execute arbitrary PHP code via a crafted option_new[report_w_day] parameter in a pr...
How severe is CVE-2006-7173?
CVE-2006-7173 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-7173?
Check the references section above for vendor advisories and patch information. Affected products include: Php-Stats Php-Stats.