CVE-2006-5020

Public Exploit

Description

Multiple PHP remote file inclusion vulnerabilities in SolidState 0.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the base_path parameter in manager/pages/ scripts including (1) AccountsPage.class.php, (2) AddInvoicePage.class.php, (3) AddIPAddressPage.class.php, (4) AddPaymentPage.class.php, (5) AddTaxRulePage.class.php, (6) AssignDomainPage.class.php, (7) AssignHostingPage.class.php, (8) AssignProductPage.class.php, (9) BillingPage.class.php, (10) BillingPaymentPage.class.php, (11) BrowseAccountsPage.class.php, (12) BrowseInvoicesPage.class.php, (13) ConfigureEditUserPage.class.php, (14) ConfigureNewUserPage.class.php, (15) ConfigureNewUserReceiptPage.class.php, (16) ConfigureUsersPage.class.php, (17) DeleteAccountPage.class.php, (18) DeleteDomainServicePage.class.php, (19) DeleteHostingServicePage.class.php, (20) DeleteInvoicePage.class.php, (21) DeleteProductPage.class.php, (22) DeleteServerPage.class.php, (23) DomainServicesPage.class.php, (24) DomainsPage.class.php, (25) EditAccountPage.class.php, (26) EditDomainPage.class.php, (27) EditDomainServicePage.class.php, (28) EditHostingServicePage.class.php, (29) EditPaymentPage.class.php, (30) EditProductPage.class.php, (31) EditServerPage.class.php, (32) EmailInvoicePage.class.php, (33) ExecuteOrderPage.class.php, (34) ExpiredDomainsPage.class.php, (35) FulfilledOrdersPage.class.php, (36) GenerateInvoicesPage.class.php, (37) HomePage.class.php, (38) InactiveAccountsPage.class.php, (39) IPManagerPage.class.php, (40) LoginPage.class.php, (41) LogPage.class.php, (42) ModulesPage.class.php, (43) NewAccountPage.class.php, (44) NewDomainServicePage.class.php, (45) NewProductPage.class.php, (46) OutstandingInvoicesPage.class.php, (47) PendingAccountsPage.class.php, (48) PendingOrdersPage.class.php, (49) PrintInvoicePage.class.php, (50) ProductsPage.class.php, (51) RegisterDomainPage.class.php, (52) RegisteredDomainsPage.class.php, (53) ServersPage.class.php, (54) ServicesHostingServicesPage.class.php, (55) ServicesNewHostingPage.class.php, (56) ServicesPage.class.php, (57) ServicesWebHostingPage.class.php, (58) SettingsPage.class.php, (59) TaxesPage.class.php, (60) TransferDomainPage.class.php, (61) ViewAccountPage.class.php, (62) ViewDomainServicePage.class.php, (63) ViewHostingServicePage.class.php, (64) ViewInvoicePage.class.php, (65) ViewLogMessagePage.class.php, (66) ViewOrderPage.class.php, (67) ViewProductPage.class.php, (68) ViewServerPage.class.php, (69) WelcomeEmailPage.class.php; and (70) modules/RegistrarModule.class.php, (71) modules/SolidStateModule.class.php, (72) modules/authorizeaim/authorizeaim.class.php, and (73) modules/authorizeaim/pages/AAIMConfigPage.class.php.

7.5
CVSS
Severity: High
CVSS 2.0 •
EPSS 9.55% Top 10%
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
https://exchange.xforce.ibmcloud.com/vulnerabilities/29095 vdb entry
http://www.osvdb.org/31120 vdb entry
http://www.osvdb.org/31147 vdb entry
http://www.osvdb.org/31141 vdb entry
http://www.osvdb.org/31139 vdb entry
http://www.osvdb.org/31192 vdb entry
http://www.osvdb.org/31106 vdb entry
http://www.osvdb.org/31135 vdb entry
http://www.osvdb.org/31117 vdb entry
http://attrition.org/pipermail/vim/2007-January/001210.html mailing list
http://www.osvdb.org/31144 vdb entry
http://www.securityfocus.com/bid/21934 vdb entry
http://www.osvdb.org/31100 vdb entry
http://www.osvdb.org/31112 vdb entry
http://www.osvdb.org/31109 vdb entry
http://www.osvdb.org/31193 vdb entry
http://www.osvdb.org/31115 vdb entry
http://www.osvdb.org/31131 vdb entry
http://www.osvdb.org/31203 vdb entry
http://www.osvdb.org/31194 vdb entry
http://www.osvdb.org/31146 vdb entry
http://www.osvdb.org/31191 vdb entry
http://www.osvdb.org/31105 vdb entry
http://www.osvdb.org/31119 vdb entry
http://www.osvdb.org/31197 vdb entry
http://www.osvdb.org/31136 vdb entry
http://www.osvdb.org/31116 vdb entry
http://www.osvdb.org/31099 vdb entry
http://www.osvdb.org/31114 vdb entry
http://www.osvdb.org/31134 vdb entry
http://www.osvdb.org/31190 vdb entry
http://www.osvdb.org/31145 vdb entry
http://www.osvdb.org/31122 vdb entry
http://www.osvdb.org/31111 vdb entry
http://www.osvdb.org/31104 vdb entry
http://www.osvdb.org/31113 vdb entry
http://www.solid-state.org/index.php?name=PNphpBB2&file=portal&article=1
http://www.osvdb.org/31199 vdb entry
http://www.osvdb.org/31128 vdb entry
https://www.exploit-db.com/exploits/2413 exploit
http://www.osvdb.org/31125 vdb entry
http://www.osvdb.org/31107 vdb entry
http://www.osvdb.org/31098 vdb entry
http://www.osvdb.org/31137 vdb entry
http://www.osvdb.org/31200 vdb entry
http://www.osvdb.org/31143 vdb entry
http://www.osvdb.org/31198 vdb entry
http://www.osvdb.org/31123 vdb entry
http://www.osvdb.org/31126 vdb entry
http://www.osvdb.org/31124 vdb entry
http://www.osvdb.org/31201 vdb entry
http://www.osvdb.org/31097 vdb entry
http://www.osvdb.org/31110 vdb entry
http://www.osvdb.org/31121 vdb entry
http://www.osvdb.org/31133 vdb entry
http://www.osvdb.org/31138 vdb entry
http://www.osvdb.org/31130 vdb entry
http://www.osvdb.org/31127 vdb entry
http://www.osvdb.org/31202 vdb entry
http://www.osvdb.org/31108 vdb entry
http://www.osvdb.org/31129 vdb entry
http://www.osvdb.org/31132 vdb entry
http://www.osvdb.org/31118 vdb entry
http://www.osvdb.org/31142 vdb entry

Frequently Asked Questions

What is the severity of CVE-2006-5020?
CVE-2006-5020 has been scored as a high severity vulnerability.
How to fix CVE-2006-5020?
To fix CVE-2006-5020, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2006-5020 being actively exploited in the wild?
It is possible that CVE-2006-5020 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~10% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.