Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL network
high complexity
opendock
exploit available
Published: 2006-10-12
Updated: 2018-10-17
Summary
Multiple PHP remote file inclusion vulnerabilities in OpenDock Easy Gallery 1.4 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the doc_directory parameter in (1) file.php; (2) find_user.php, (3) lib_user.php, (4) lib_form_user.php, and (5) user.php in sw/lib_user/; (6) find_session.php and (7) session.php in sw/lib_session/; (8) comment.php and (9) lib_comment.php in sw/lib_comment/; and other unspecified PHP scripts. Successful exploitation requires that "register_globals" is enabled.
Vulnerable Configurations
Part | Description | Count |
Application | Opendock | 1 |
Exploit-Db
description | OpenDock Easy Gallery <= 1.4 (doc_directory) File Include Vulnerabilities. CVE-2006-5241. Webapps exploit for php platform |
file | exploits/php/webapps/2497.txt |
id | EDB-ID:2497 |
last seen | 2016-01-31 |
modified | 2006-10-09 |
platform | php |
port | |
published | 2006-10-09 |
reporter | the_day |
source | https://www.exploit-db.com/download/2497/ |
title | OpenDock Easy Gallery <= 1.4 - doc_directory File Include Vulnerabilities |
type | webapps |