CVE-2006-5762
⚪ Do wiadomości
Wykorzystanie luki w Free File Hosting umożliwia zdalne wykonanie kodu PHP.
CVSS
5.1
EPSS
14.3%
Exploit
poc
Vendor
free_php_scripts
Opis źródłowy (NVD)
PHP remote file inclusion vulnerability in forgot_pass.php in Free File Hosting 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter. NOTE: this issue was later reported for the "File Upload System" which is a component of Free File Hosting. This also affects Free Image Hosting 2.0, which contains the same code.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 5.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 14.3% |
| Opublikowano (NVD) | 2006-11-06 23:07:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-23 00:35:47 UTC |
Referencje
- http://secunia.com/advisories/22594 (cve@mitre.org) [Vendor Advisory]
- http://www.attrition.org/pipermail/vim/2007-March/001473.html (cve@mitre.org)
- http://www.osvdb.org/30143 (cve@mitre.org)
- http://www.rahim.webd.pl/exploity/Exploits/111.txt (cve@mitre.org) [Exploit]
- http://www.securityfocus.com/archive/1/463707/100/0/threaded (cve@mitre.org)
- http://www.securityfocus.com/bid/20781 (cve@mitre.org) [Exploit]
- http://www.securityfocus.com/bid/23118 (cve@mitre.org)
- http://www.vupen.com/english/advisories/2006/4228 (cve@mitre.org) [Vendor Advisory]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29874 (cve@mitre.org)
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33196 (cve@mitre.org)
- https://www.exploit-db.com/exploits/2670 (cve@mitre.org)
- https://www.exploit-db.com/exploits/3568 (cve@mitre.org)