Vulnerabilities > CVE-2006-0125 - Remote File Include vulnerability in Appserv Open Project Appserv 2.4.5

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
appserv-open-project
nessus
exploit available

Summary

Unspecified vulnerability in appserv/main.php in AppServ 2.4.5 allows remote attackers to include arbitrary files via the appserv_root parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. There is not enough detail from these third party sources to know whether this is directory traversal, remote file include, or another issue.

Vulnerable Configurations

Part Description Count
Application
Appserv_Open_Project
1

Exploit-Db

descriptionAppServ Open Project 2.4.5 Remote File Include Vulnerability. CVE-2006-0125. Webapps exploit for php platform
idEDB-ID:27048
last seen2016-02-03
modified2006-01-09
published2006-01-09
reporterXez
sourcehttps://www.exploit-db.com/download/27048/
titleAppServ Open Project 2.4.5 - Remote File Include Vulnerability

Nessus

NASL familyCGI abuses
NASL idAPPSERV_APPSERV_ROOT_INCLUDES.NASL
descriptionThe remote host appears to be running AppServ, a compilation of Apache, PHP, MySQL, and phpMyAdmin for Windows and Linux. The version of AppServ installed on the remote host fails to sanitize user-supplied input to the
last seen2020-06-01
modified2020-06-02
plugin id20383
published2006-01-10
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20383
titleAppServ appserv/main.php appserv_root Parameter Remote File Inclusion