CVE-2006-7015

Current Description

** DISPUTED ** PHP remote file inclusion vulnerability in admin.jobline.php in Jobline 1.1.1 allows remote attackers to execute arbitrary code via a URL in the mosConfig_absolute_path parameter. NOTE: CVE disputes this issue because the script is protected against direct requests.

Basic Data

PublishedFebruary 15, 2007
Last ModifiedOctober 16, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationJoblineJobline1.1.1*******

Vulnerable Software List

VendorProductVersions
Jobline Jobline 1.1.1

References

NameSourceURLTags
2254http://securityreason.com/securityalert/2254SREASON
20070214 false: old Jobline RFIhttp://www.attrition.org/pipermail/vim/2007-February/001325.htmlVIM
20060613 Jobline 1 1 1 Version - Remote File Include Vulnerabilityhttp://www.securityfocus.com/archive/1/436990/30/4440/threadedBUGTRAQ
jobline-mosconfig-file-include(27125)https://exchange.xforce.ibmcloud.com/vulnerabilities/27125XF