Vulnerabilities > CVE-2006-2149 - Unspecified vulnerability in Avatic Aardvark Topsites PHP 4.2.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
PHP remote file inclusion vulnerability in sources/lostpw.php in Aardvark Topsites PHP 4.2.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the CONFIG[path] parameter, as demonstrated by including a GIF that contains PHP code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Aardvark Topsites PHP <= 4.2.2 (lostpw.php) Remote Include Exploit. CVE-2006-2149. Webapps exploit for php platform |
file | exploits/php/webapps/1732.pl |
id | EDB-ID:1732 |
last seen | 2016-01-31 |
modified | 2006-04-30 |
platform | php |
port | |
published | 2006-04-30 |
reporter | cijfer |
source | https://www.exploit-db.com/download/1732/ |
title | Aardvark Topsites PHP <= 4.2.2 lostpw.php Remote Include Exploit |
type | webapps |
Nessus
NASL family | CGI abuses |
NASL id | AARDVARK_422_REMOTE_FILE_INCLUDE.NASL |
description | Aardvark Topsites PHP is installed on the remote host. It is an open source toplist management system written in PHP. The application does not sanitize user-supplied input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21329 |
published | 2006-05-08 |
reporter | This script is Copyright (C) 2006-2018 Ferdy Riphagen |
source | https://www.tenable.com/plugins/nessus/21329 |
title | Aardvark Topsites CONFIG[path] Parameter Remote File Inclusion |
References
- http://secunia.com/advisories/19911
- http://secunia.com/advisories/19911
- http://www.osvdb.org/25158
- http://www.osvdb.org/25158
- http://www.securityfocus.com/bid/17940
- http://www.securityfocus.com/bid/17940
- http://www.vupen.com/english/advisories/2006/1587
- http://www.vupen.com/english/advisories/2006/1587
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26189
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26189
- https://www.exploit-db.com/exploits/1732
- https://www.exploit-db.com/exploits/1732