Vulnerabilities > CVE-2006-2149 - Remote File Include vulnerability in Avatic Aardvark Topsites PHP 4.2.2

047910
CVSS 6.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
avatic
nessus
exploit available

Summary

PHP remote file inclusion vulnerability in sources/lostpw.php in Aardvark Topsites PHP 4.2.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the CONFIG[path] parameter, as demonstrated by including a GIF that contains PHP code.

Vulnerable Configurations

Part Description Count
Application
Avatic
1

Exploit-Db

descriptionAardvark Topsites PHP <= 4.2.2 (lostpw.php) Remote Include Exploit. CVE-2006-2149. Webapps exploit for php platform
fileexploits/php/webapps/1732.pl
idEDB-ID:1732
last seen2016-01-31
modified2006-04-30
platformphp
port
published2006-04-30
reportercijfer
sourcehttps://www.exploit-db.com/download/1732/
titleAardvark Topsites PHP <= 4.2.2 lostpw.php Remote Include Exploit
typewebapps

Nessus

NASL familyCGI abuses
NASL idAARDVARK_422_REMOTE_FILE_INCLUDE.NASL
descriptionAardvark Topsites PHP is installed on the remote host. It is an open source toplist management system written in PHP. The application does not sanitize user-supplied input to the
last seen2020-06-01
modified2020-06-02
plugin id21329
published2006-05-08
reporterThis script is Copyright (C) 2006-2018 Ferdy Riphagen
sourcehttps://www.tenable.com/plugins/nessus/21329
titleAardvark Topsites CONFIG[path] Parameter Remote File Inclusion