{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2006-4428", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "** DISPUTED ** PHP remote file inclusion vulnerability in index.php in Jupiter CMS 1.1.5 allows remote attackers to execute arbitrary PHP code via a URL in the template parameter. NOTE: CVE disputes this claim, since the $template variable is defined as a static value before it is referenced in an include statement." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20060825 Jupiter CMS 1.1.5 index.php Remote File Include", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/444421/100/0/threaded" }, { "name" : "20060829 Re: Jupiter CMS 1.1.5 index.php Remote File Include", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/444729/100/0/threaded" }, { "name" : "20060828 Jupiter CMS file include - CVE dispute", "refsource" : "VIM", "url" : "http://www.attrition.org/pipermail/vim/2006-August/000996.html" }, { "name" : "19721", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/19721" }, { "name" : "28298", "refsource" : "OSVDB", "url" : "http://www.osvdb.org/28298" }, { "name" : "jupitercm-index-file-include(28589)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28589" } ] } }