Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2006-5186
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-10 Oct, 2006 | 04:06
Updated At-17 Oct, 2018 | 21:41

PHP remote file inclusion vulnerability in functions.php in phpMyProfiler 0.9.6 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the pmp_rel_path parameter.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.1MEDIUM
AV:N/AC:H/Au:N/C:P/I:P/A:P
CPE Matches

phpmyprofiler
phpmyprofiler
>>phpmyprofiler>>Versions up to 0.9.6(inclusive)
cpe:2.3:a:phpmyprofiler:phpmyprofiler:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Successful exploitation requires that "register_globals" is enabled. This vulnerability is addressed in the following product update: phpMyProfiler, phpMyProfiler, 0.9.6b

Vendor Statements

References
HyperlinkSourceResource
http://forum.phpmyprofiler.de/viewtopic.php?p=2745#2745cve@mitre.org
Patch
http://secunia.com/advisories/22144cve@mitre.org
Patch
Vendor Advisory
http://securityreason.com/securityalert/1696cve@mitre.org
N/A
http://securitytracker.com/id?1016980cve@mitre.org
Exploit
Patch
http://www.phpmyprofiler.de/index.php?page=2cve@mitre.org
Patch
http://www.securityfocus.com/archive/1/447646/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/20324cve@mitre.org
Exploit
http://www.vupen.com/english/advisories/2006/3896cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/29335cve@mitre.org
N/A
https://www.exploit-db.com/exploits/2470cve@mitre.org
N/A
Change History
0Changes found

Details not found