Vulnerabilities > CVE-2006-5250 - Remote File Include vulnerability in BlueShoes Framework GoogleSearch.PHP

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
blueshoes
nessus
exploit available

Summary

PHP remote file inclusion vulnerability in lib/googlesearch/GoogleSearch.php in BlueShoes 4.6_public and earlier allows remote attackers to execute arbitrary PHP code via a URL in the APP[path][lib] parameter, a different vector than CVE-2006-2864. The following conditions must be met in order for this vulnerability to be exploited: 1) BlueShoes is installed in the webroot (really not recommended, see installation manual 2) register_globals is on (really really not recommended, off by default since php 4.2.0, read http://www.php.net/register_globals 3) allow_url_fopen is on (on by default, often set to off by hosting providers)

Vulnerable Configurations

Part Description Count
Application
Blueshoes
1

Exploit-Db

descriptionBlueShoes Framework 4.6 GoogleSearch.PHP Remote File Include Vulnerability. CVE-2006-5250 . Webapps exploit for php platform
idEDB-ID:28781
last seen2016-02-03
modified2006-10-10
published2006-10-10
reporterk1tk4t
sourcehttps://www.exploit-db.com/download/28781/
titleBlueShoes Framework 4.6 GoogleSearch.PHP Remote File Include Vulnerability

Nessus

NASL familyCGI abuses
NASL idBLUESHOES_APP_FILE_INCLUDE.NASL
descriptionThe remote host is using BlueShoes, an application framework and content management system written in PHP. The version of BlueShoes installed on the remote host fails to sanitize input to the
last seen2020-06-01
modified2020-06-02
plugin id22541
published2006-10-13
reporterThis script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/22541
titleBlueShoes lib/googlesearch/GoogleSearch.php APP[path][lib] Parameter Remote File Inclusion