CVE-2006-0479

Pmwiki - XSS

Title source: rule
STIX 2.1

Description

pmwiki.php in PmWiki 2.1 beta 20, with register_globals enabled, allows remote attackers to bypass protection mechanisms that deregister global variables by setting both a GPC variable and a GLOBALS[] variable with the same name, which causes PmWiki to unset the GLOBALS[] variable but not the GPC variable, which creates resultant vulnerabilities such as remote file inclusion and cross-site scripting (XSS).

Exploits (1)

exploitdb WRITEUP VERIFIED
by aScii · textwebappsphp
https://www.exploit-db.com/exploits/27147

References (9)

Core 9
Core References
Third Party Advisory mailing-list x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0931.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/24368
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/18634
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/24367
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1015550
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/16421
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0375
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/24366

Scores

EPSS 0.0133
EPSS Percentile 80.0%

Details

Status published
Products (1)
pmwiki/pmwiki 2.1_beta_20
Published Jan 31, 2006
Tracked Since Feb 18, 2026