Description
PHP remote file inclusion vulnerability in Shadowed Portal 5.599 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the root parameter in (1) footer.php and (2) header.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information. The bottom.php parameter is already covered by CVE-2006-4826.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by mad_hacker · textwebappsphp
https://www.exploit-db.com/exploits/2361
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/28836
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/84177
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/28837
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3629
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/21920
Scores
EPSS
0.0288
EPSS Percentile
86.5%
Details
Status
published
Products (1)
shadowed_portal/shadowed_portal
< 5.599
Published
Sep 19, 2006
Tracked Since
Feb 18, 2026