7.5
CVSSv2

CVE-2006-4848

Published: 19/09/2006 Updated: 17/05/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple PHP remote file inclusion vulnerabilities in Brian Fraval Hitweb 3.0 allow remote malicious users to execute arbitrary PHP code via a URL in the REP_CLASS parameter to (1) index.php, (2) arbo.php, (3) framepoint.php, (4) genpage.php, (5) lienvalider.php, (6) appreciation.php, (7) partenariat.php, (8) rechercher.php, (9) projet.php, (10) propoexample.php, (11) refererpoint.php, or (12) top50.php. NOTE: this issue has been disputed by a third party researcher, stating that REP_CLASS is initialized in an included file before being used

Vulnerable Product Search on Vulmon Subscribe to Product

hitweb hitweb 3.0

Exploits

source: wwwsecurityfocuscom/bid/20060/info Hitweb is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process This may facil ...