First published: Tue Aug 29 2006(Updated: )
** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in CuteNews 1.3.x allow remote attackers to execute arbitrary PHP code via a URL in the cutepath parameter to (1) show_news.php or (2) search.php. NOTE: CVE analysis as of 20060829 has not identified any scenarios in which these vectors could result in remote file inclusion.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CutePHP CuteNews | =1.3.6 | |
CutePHP CuteNews | =1.3.2 | |
CutePHP CuteNews | =1.3 | |
CutePHP CuteNews | =1.3.1 | |
=1.3 | ||
=1.3.1 | ||
=1.3.2 | ||
=1.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4445 is considered a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2006-4445, it is recommended to upgrade CuteNews to the latest version available that addresses this vulnerability.
CVE-2006-4445 affects CuteNews versions 1.3, 1.3.1, 1.3.2, and 1.3.6.
Yes, CVE-2006-4445 can be exploited by supplying malicious URLs through the cutepath parameter.
Yes, CVE-2006-4445 is a publicly documented vulnerability with known exploitation methods.