CVE-2006-2149

Current Description

PHP remote file inclusion vulnerability in sources/lostpw.php in Aardvark Topsites PHP 4.2.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the CONFIG[path] parameter, as demonstrated by including a GIF that contains PHP code.

Referenced by CVEs:CVE-2006-7026

Basic Data

PublishedMay 03, 2006
Last ModifiedOctober 19, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score6.4
SeverityMEDIUM
Exploitability Score10.0
Impact Score4.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationAvaticAardvark Topsites Php4.2.2*******

Vulnerable Software List

VendorProductVersions
Avatic Aardvark Topsites Php 4.2.2

References

NameSourceURLTags
19911http://secunia.com/advisories/19911SECUNIAVendor Advisory
25158http://www.osvdb.org/25158OSVDB
17940http://www.securityfocus.com/bid/17940BID
ADV-2006-1587http://www.vupen.com/english/advisories/2006/1587VUPEN
aardvark-lostpw-join-file-include(26189)https://exchange.xforce.ibmcloud.com/vulnerabilities/26189XF
1732https://www.exploit-db.com/exploits/1732EXPLOIT-DB