First published: Fri Jun 16 2006(Updated: )
** DISPUTED ** PHP remote file inclusion vulnerability in common.php in PHORUM 5.1.13 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the PHORUM[http_path] parameter. NOTE: this issue has been disputed by the vendor, who states "common.php is checked on the very first line of non-comment code that it is not being called directly. It has been this way in all 5.x version of Phorum." CVE analysis concurs with the vendor.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phorum | =3.2.2 | |
Phorum | =3.1.1_pre | |
Phorum | =3.4.6 | |
Phorum | =3.2.3 | |
Phorum | =5.0.15a | |
Phorum | =3.2.7 | |
Phorum | =3.4.3 | |
Phorum | =3.1.1 | |
Phorum | =3.2.8 | |
Phorum | =3.3.1a | |
Phorum | =3.4.4 | |
Phorum | =5.0.17a | |
Phorum | =3.3.1 | |
Phorum | =3.4 | |
Phorum | =3.3.2 | |
Phorum | =3.1.1_rc2 | |
Phorum | =5.0.18 | |
Phorum | =3.1.1a | |
Phorum | =3.4.5 | |
Phorum | =5.0.12 | |
Phorum | =3.4.8a | |
Phorum | =3.2.5 | |
Phorum | =3.2.3a | |
Phorum | =3.2 | |
Phorum | =5.0.16 | |
Phorum | =5.0.10 | |
Phorum | =3.1.2 | |
Phorum | =5.0.11 | |
Phorum | <=5.1.13 | |
Phorum | =5.0.9 | |
Phorum | =3.1 | |
Phorum | =5.0.14 | |
Phorum | =5.0.7_beta | |
Phorum | =3.4.2 | |
Phorum | =3.4.1 | |
Phorum | =3.4.7 | |
Phorum | =5.0.3_beta | |
Phorum | =3.4.8 | |
Phorum | =3.2.4 | |
Phorum | =5.0.13 | |
Phorum | =3.2.3b | |
Phorum | =3.3.2b3 | |
Phorum | =3.3.2a | |
Phorum | =3.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-3053 is considered medium, as it allows remote attackers to execute arbitrary PHP code.
To fix CVE-2006-3053, update your PHORUM installation to version 5.1.14 or later to mitigate the remote file inclusion vulnerability.
CVE-2006-3053 affects PHORUM version 5.1.13 and earlier versions.
Using CVE-2006-3053, remote attackers can potentially execute arbitrary PHP code on the server, leading to a breach of confidentiality or integrity.
Yes, the vendor has disputed the issue, claiming that common.php is checked at the first level, which may mitigate the vulnerability.