2017-10-16 12:31:07 -04:00
|
|
|
{
|
|
|
|
"CVE_data_meta" : {
|
|
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
|
|
"ID" : "CVE-2006-5020",
|
|
|
|
"STATE" : "PUBLIC"
|
|
|
|
},
|
|
|
|
"affects" : {
|
|
|
|
"vendor" : {
|
|
|
|
"vendor_data" : [
|
|
|
|
{
|
|
|
|
"product" : {
|
|
|
|
"product_data" : [
|
|
|
|
{
|
|
|
|
"product_name" : "n/a",
|
|
|
|
"version" : {
|
|
|
|
"version_data" : [
|
|
|
|
{
|
|
|
|
"version_value" : "n/a"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
"vendor_name" : "n/a"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"data_format" : "MITRE",
|
|
|
|
"data_type" : "CVE",
|
|
|
|
"data_version" : "4.0",
|
|
|
|
"description" : {
|
|
|
|
"description_data" : [
|
|
|
|
{
|
|
|
|
"lang" : "eng",
|
|
|
|
"value" : "Multiple PHP remote file inclusion vulnerabilities in SolidState 0.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the base_path parameter in manager/pages/ scripts including (1) AccountsPage.class.php, (2) AddInvoicePage.class.php, (3) AddIPAddressPage.class.php, (4) AddPaymentPage.class.php, (5) AddTaxRulePage.class.php, (6) AssignDomainPage.class.php, (7) AssignHostingPage.class.php, (8) AssignProductPage.class.php, (9) BillingPage.class.php, (10) BillingPaymentPage.class.php, (11) BrowseAccountsPage.class.php, (12) BrowseInvoicesPage.class.php, (13) ConfigureEditUserPage.class.php, (14) ConfigureNewUserPage.class.php, (15) ConfigureNewUserReceiptPage.class.php, (16) ConfigureUsersPage.class.php, (17) DeleteAccountPage.class.php, (18) DeleteDomainServicePage.class.php, (19) DeleteHostingServicePage.class.php, (20) DeleteInvoicePage.class.php, (21) DeleteProductPage.class.php, (22) DeleteServerPage.class.php, (23) DomainServicesPage.class.php, (24) DomainsPage.class.php, (25) EditAccountPage.class.php, (26) EditDomainPage.class.php, (27) EditDomainServicePage.class.php, (28) EditHostingServicePage.class.php, (29) EditPaymentPage.class.php, (30) EditProductPage.class.php, (31) EditServerPage.class.php, (32) EmailInvoicePage.class.php, (33) ExecuteOrderPage.class.php, (34) ExpiredDomainsPage.class.php, (35) FulfilledOrdersPage.class.php, (36) GenerateInvoicesPage.class.php, (37) HomePage.class.php, (38) InactiveAccountsPage.class.php, (39) IPManagerPage.class.php, (40) LoginPage.class.php, (41) LogPage.class.php, (42) ModulesPage.class.php, (43) NewAccountPage.class.php, (44) NewDomainServicePage.class.php, (45) NewProductPage.class.php, (46) OutstandingInvoicesPage.class.php, (47) PendingAccountsPage.class.php, (48) PendingOrdersPage.class.php, (49) PrintInvoicePage.class.php, (50) ProductsPage.class.php, (51) RegisterDomainPage.class.php, (52) RegisteredDomainsPage.class.php, (53) ServersPage.class.php, (54) ServicesHostingServicesPage.class.php, (55) ServicesNewHostingPage.class.php, (56) ServicesPage.class.php, (57) ServicesWebHostingPage.class.php, (58) SettingsPage.class.php, (59) TaxesPage.class.php, (60) TransferDomainPage.class.php, (61) ViewAccountPage.class.php, (62) ViewDomainServicePage.class.php, (63) ViewHostingServicePage.class.php, (64) ViewInvoicePage.class.php, (65) ViewLogMessagePage.class.php, (66) ViewOrderPage.class.php, (67) ViewProductPage.class.php, (68) ViewServerPage.class.php, (69) WelcomeEmailPage.class.php; and (70) modules/RegistrarModule.class.php, (71) modules/SolidStateModule.class.php, (72) modules/authorizeaim/authorizeaim.class.php, and (73) modules/authorizeaim/pages/AAIMConfigPage.class.php."
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
"problemtype" : {
|
|
|
|
"problemtype_data" : [
|
|
|
|
{
|
|
|
|
"description" : [
|
|
|
|
{
|
|
|
|
"lang" : "eng",
|
|
|
|
"value" : "n/a"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
"references" : {
|
|
|
|
"reference_data" : [
|
|
|
|
{
|
2017-10-18 13:04:39 -04:00
|
|
|
"url" : "https://www.exploit-db.com/exploits/2413"
|
2017-10-16 12:31:07 -04:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.solid-state.org/index.php?name=PNphpBB2&file=portal&article=1"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://attrition.org/pipermail/vim/2007-January/001210.html"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.securityfocus.com/bid/21934"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31097"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31098"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31099"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31100"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31104"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31105"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31106"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31107"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31108"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31109"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31110"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31111"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31112"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31113"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31114"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31115"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31116"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31117"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31118"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31119"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31120"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31121"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31122"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31123"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31124"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31125"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31126"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31127"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31128"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31129"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31130"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31131"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31132"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31133"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31134"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31141"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31142"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31143"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31144"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31145"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31146"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31147"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31190"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31191"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31192"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31193"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31194"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31197"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31198"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31199"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31200"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31201"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31202"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31203"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31135"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31136"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31137"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31138"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "http://www.osvdb.org/31139"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29095"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
}
|