First published: Thu Sep 14 2006(Updated: )
src/index.php in WebSPELL 4.01.01 and earlier, when register_globals is enabled, allows remote attackers to bypass authentication and gain sensitive information stored in the database via a modified userID parameter in a write action to admin/database.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webspell | <=4.01.01 | |
Webspell | =4.1 | |
Webspell | =4.0 | |
Webspell | =4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4782 has a high severity rating due to its ability to bypass authentication and access sensitive information.
To fix CVE-2006-4782, disable register_globals and update to a patched version of WebSPELL.
CVE-2006-4782 affects WebSPELL versions 4.01.01 and earlier, along with specific versions of 4.0, 4.1, and 4.1.1.
An attacker could potentially gain unauthorized access to sensitive data stored within the database by exploiting CVE-2006-4782.
Yes, a temporary workaround for CVE-2006-4782 is to disable the register_globals directive in the PHP configuration.