Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2006-6966
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
phpGraphy before 0.9.13a does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary PHP code by uploading a config.php file via the pictures[] parameter to index.php. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpGraphy.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
phpGraphy PHP代码执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
phpGraphy 0.9.13a版本之前的版本版本当输入数据包含一个具有与一个字母数字参数的信息值相匹配的数字参数时,没有适当地设置自变量。这会允许远程攻击者可以借助对index.php的pictures[]参数上传一个config.php文件,执行任意PHP代码。注意:未安装的PHP指令(CVE-2006-3017)中存在错误是形成漏洞的原因尚存在争议,且合适的修复应该在PHP中;如果是这样的话,该漏洞应该当作phpGraphy中的漏洞对待。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2006-6966
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2006-6966
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2006-6966

No comments yet


Leave a comment