First published: Thu Aug 10 2006(Updated: )
Multiple PHP remote file inclusion vulnerabilities in Csaba Godor SAPID Blog Beta 2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) root_path parameter to (a) usr/extensions/get_blog_infochannel.inc.php, (b) usr/extensions/get_blog_meta_info.inc.php, or (c) usr/extensions/get_infochannel.inc.php; or the (2) GLOBALS[root_path] parameter to (d) usr/extensions/get_tree.inc.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAPID | =initial |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4063 is classified as a critical vulnerability due to its ability to allow remote code execution.
To fix CVE-2006-4063, update to the latest version of SAPID Blog and ensure that file inclusion vulnerabilities are mitigated.
CVE-2006-4063 affects SAPID Blog Beta 2 and earlier versions.
CVE-2006-4063 is a remote file inclusion vulnerability that allows attackers to execute arbitrary PHP code.
Yes, CVE-2006-4063 can be exploited remotely by attackers through crafted URL parameters.