WSN Forum 1.3.4 and earlier allows remote attackers to execute arbitrary PHP code via a modified pathname in the pathtoconfig parameter that points to an avatar image that contains PHP code, which is then accessed from prestart.php. NOTE: this issue has been labeled remote file inclusion, but that label only applies to the attack, not the underlying vulnerability.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2006-10-20T10:00:00
Updated: 2024-08-07T19:48:30.258Z
Reserved: 2006-10-19T00:00:00
Link: CVE-2006-5421
Vulnrichment
No data.
NVD
Status : Modified
Published: 2006-10-20T14:07:00.000
Modified: 2024-11-21T00:19:10.367
Link: CVE-2006-5421
Redhat
No data.