First published: Thu Jun 22 2006(Updated: )
** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in Nucleus 3.23 allow remote attackers to execute arbitrary PHP code via a URL the DIR_LIBS parameter in (1) path/action.php, and to files in path/nucleus including (2) media.php, (3) /xmlrpc/server.php, and (4) /xmlrpc/api_metaweblog.inc.php. NOTE: this is a similar vulnerability to CVE-2006-2583. NOTE: this issue has been disputed by third parties, who state that the DIR_LIBS parameter is defined in an include file before being used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NucleusCMS | =3.0 | |
NucleusCMS | =3.0_1 | |
NucleusCMS | =3.0_rc | |
NucleusCMS | =3.1 | |
NucleusCMS | =3.2 | |
NucleusCMS | =3.21 | |
NucleusCMS | =3.22 | |
NucleusCMS | =3.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3136 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2006-3136, upgrade to a patched version of Nucleus CMS that resolves the remote file inclusion vulnerabilities.
CVE-2006-3136 affects Nucleus CMS versions 3.0, 3.1, 3.21, 3.22, 3.23, and all related release candidates.
Yes, CVE-2006-3136 can potentially lead to data compromise as it allows attackers to execute arbitrary PHP code.
Yes, multiple exploit methods have been documented for CVE-2006-3136, primarily leveraging remote file inclusion.