4.3
CVSSv2

CVE-2006-0479

Published: 31/01/2006 Updated: 20/07/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

pmwiki.php in PmWiki 2.1 beta 20, with register_globals enabled, allows remote malicious users to bypass protection mechanisms that deregister global variables by setting both a GPC variable and a GLOBALS[] variable with the same name, which causes PmWiki to unset the GLOBALS[] variable but not the GPC variable, which creates resultant vulnerabilities such as remote file inclusion and cross-site scripting (XSS).

Vulnerable Product Search on Vulmon Subscribe to Product

pmwiki pmwiki 2.1_beta_20

Exploits

source: wwwsecurityfocuscom/bid/16421/info PmWiki is prone to multiple input-validation vulnerabilities These issues are due to failures in the application to properly sanitize user-supplied input - Arbitrary remote file-include vulnerability Exploitation of this issue will result in the execution of attacker-supplied code in the cont ...