Description
PHP remote file inclusion vulnerability in Sonium Enterprise Adressbook 0.2 allows remote attackers to execute arbitrary PHP code via the folder parameter in multiple files in the plugins directory, as demonstrated by plugins/1_Adressbuch/delete.php.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Philipp Niedziela · textwebappsphp
https://www.exploit-db.com/exploits/2216
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/19597
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3334
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/21553
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/443701/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/28464
Various Sources x_refsource_misc
http://www.bb-pcsecurity.de/Websecurity/342/org/Sonium_Enterprise_Adressbook_Version_0.2_%28folder%29_RFI.htm
Scores
EPSS
0.0325
EPSS Percentile
87.2%
Details
Status
published
Products (1)
sonium/enterprise_adressbook
0.2
Published
Aug 23, 2006
Tracked Since
Feb 18, 2026