7.5
CVSSv2

CVE-2006-2877

Published: 07/06/2006 Updated: 18/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 770
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

PHP remote file inclusion vulnerability in Bookmark4U 2.0.0 and previous versions allows remote malicious users to include arbitrary PHP files via the include_prefix parameter in (1) inc/dbase.php, (2) inc/config.php, (3) inc/common.php, and (4) inc/function.php. NOTE: it has been reported that the inc directory is protected by a .htaccess file, so this issue only applies in certain environments or configurations.

Vulnerable Product Search on Vulmon Subscribe to Product

sangwan kim bookmark4u

Exploits

source: wwwsecurityfocuscom/bid/18281/info Bookmark4U is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include arbitrary remote files containing malicious PHP code and execute it in the context ...
source: wwwsecurityfocuscom/bid/18281/info Bookmark4U is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include arbitrary remote files containing malicious PHP code and execute it in the conte ...
source: wwwsecurityfocuscom/bid/18281/info Bookmark4U is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include arbitrary remote files containing malicious PHP code and execute it in the context o ...
source: wwwsecurityfocuscom/bid/18281/info Bookmark4U is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include arbitrary remote files containing malicious PHP code and execute it in the con ...