CVE-2006-5291

Current Description

PHP remote file inclusion vulnerability in admin/includes/spaw/spaw_control.class.php in Download-Engine 1.4.2 allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: CVE analysis suggests that this issue is actually in a third party product, SPAW Editor PHP Edition, so this issue is probably a duplicate of CVE-2006-4656.

Referenced by CVEs:CVE-2006-5459, CVE-2007-2255

Basic Data

PublishedOctober 16, 2006
Last ModifiedOctober 17, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-94
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationAlexDownloadengine1.4.2*******

Vulnerable Software List

VendorProductVersions
Alex Downloadengine 1.4.2

References

NameSourceURLTags
22383http://secunia.com/advisories/22383SECUNIAVendor Advisory
1723http://securityreason.com/securityalert/1723SREASON
http://spaw.cvs.sourceforge.net/spaw/spaw/docs/ChangeLog.txt?view=markuphttp://spaw.cvs.sourceforge.net/spaw/spaw/docs/ChangeLog.txt?view=markupCONFIRM
http://spaw.cvs.sourceforge.net/spaw/spaw/spaw_control.class.php?r1=1.19&r2=1.20http://spaw.cvs.sourceforge.net/spaw/spaw/spaw_control.class.php?r1=1.19&r2=1.20MISC
http://spaw.cvs.sourceforge.net/spaw/spaw/spaw_control.class.php?r1=1.25&r2=1.26http://spaw.cvs.sourceforge.net/spaw/spaw/spaw_control.class.php?r1=1.25&r2=1.26MISC
20061012 Download-Engine Remote File Includehttp://www.securityfocus.com/archive/1/448450/100/0/threadedBUGTRAQ
20500http://www.securityfocus.com/bid/20500BIDExploit
ADV-2006-4025http://www.vupen.com/english/advisories/2006/4025VUPENVendor Advisory
downloadengine-spaw-file-include(29493)https://exchange.xforce.ibmcloud.com/vulnerabilities/29493XF
2521https://www.exploit-db.com/exploits/2521EXPLOIT-DB