Vulnerabilities > CVE-2006-1551 - Unspecified vulnerability in Georges Auberger Pajax 0.5.0/0.5.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Eval injection vulnerability in pajax_call_dispatcher.php in PAJAX 0.5.1 and earlier allows remote attackers to execute arbitrary code via the (1) $method and (2) $args parameters.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | PAJAX Remote Command Execution. CVE-2006-1551. Webapps exploit for php platform |
id | EDB-ID:16901 |
last seen | 2016-02-02 |
modified | 2010-04-30 |
published | 2010-04-30 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16901/ |
title | PAJAX Remote Command Execution |
Metasploit
description | RedTeam has identified two security flaws in PAJAX (<= 0.5.1). It is possible to execute arbitrary PHP code from unchecked user input. Additionally, it is possible to include arbitrary files on the server ending in ".class.php". |
id | MSF:EXPLOIT/UNIX/WEBAPP/PAJAX_REMOTE_EXEC |
last seen | 2020-06-13 |
modified | 2017-07-24 |
published | 2007-01-05 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/pajax_remote_exec.rb |
title | PAJAX Remote Command Execution |
Nessus
NASL family | CGI abuses |
NASL id | PAJAX_052.NASL |
description | The remote host is running PAJAX, a PHP library for remote asynchronous objects in JavaScript. The version of PAJAX installed on the remote host fails to validate input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21227 |
published | 2006-04-16 |
reporter | This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/21227 |
title | PAJAX < 0.5.2 Multiple Vulnerabilities |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/82363/pajax_remote_exec.rb.txt id PACKETSTORM:82363 last seen 2016-12-05 published 2009-10-30 reporter Matteo Cantoni source https://packetstormsecurity.com/files/82363/PAJAX-Remote-Command-Execution.html title PAJAX Remote Command Execution data source https://packetstormsecurity.com/files/download/45491/pajax-0.5.1.txt id PACKETSTORM:45491 last seen 2016-12-05 published 2006-04-17 reporter RedTeam Pentesting source https://packetstormsecurity.com/files/45491/pajax-0.5.1.txt.html title pajax-0.5.1.txt
References
- http://archives.neohapsis.com/archives/fulldisclosure/2006-04/0270.html
- http://archives.neohapsis.com/archives/fulldisclosure/2006-04/0270.html
- http://secunia.com/advisories/19653
- http://secunia.com/advisories/19653
- http://www.osvdb.org/24618
- http://www.osvdb.org/24618
- http://www.redteam-pentesting.de/advisories/rt-sa-2006-001.php
- http://www.redteam-pentesting.de/advisories/rt-sa-2006-001.php
- http://www.securityfocus.com/archive/1/431029/100/0/threaded
- http://www.securityfocus.com/archive/1/431029/100/0/threaded
- http://www.securityfocus.com/bid/17519
- http://www.securityfocus.com/bid/17519
- http://www.vupen.com/english/advisories/2006/1353
- http://www.vupen.com/english/advisories/2006/1353
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25859
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25859