CVE-2006-5669

Gepi <1.4.4 - Code Injection

Title source: llm
STIX 2.1

Description

PHP remote file inclusion vulnerability in gestion/savebackup.php in Gepi 1.4.0 and earlier, and possibly other versions before 1.4.4, allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Sumit Siddharth · textwebappsphp
https://www.exploit-db.com/exploits/2692

References (4)

Core 4
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/2692
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/29921
Third Party Advisory mailing-list x_refsource_vim
http://www.attrition.org/pipermail/vim/2006-November/001104.html
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/20830

Scores

EPSS 0.0495
EPSS Percentile 89.7%

Details

Status published
Products (1)
gepi/gepi 1.4.0
Published Nov 03, 2006
Tracked Since Feb 18, 2026