Vulnerabilities > CVE-2006-6661 - Remote Security vulnerability in Php-Update
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Variable overwrite vulnerability in blog.php in PHP-Update 2.7 and earlier allows remote attackers to overwrite arbitrary program variables and execute arbitrary PHP code via multiple vectors that use the extract function, as demonstrated by the (1) f, (2) newmessage, (3) newusername, (4) adminuser, and (5) permission parameters.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | PHP-Update <= 2.7 extract() Auth Bypass / Shell Inject Exploit. CVE-2006-6661. Webapps exploit for php platform |
file | exploits/php/webapps/2953.php |
id | EDB-ID:2953 |
last seen | 2016-01-31 |
modified | 2006-12-19 |
platform | php |
port | |
published | 2006-12-19 |
reporter | rgod |
source | https://www.exploit-db.com/download/2953/ |
title | PHP-Update <= 2.7 extract Auth Bypass / Shell Inject Exploit |
type | webapps |
Nessus
NASL family | CGI abuses |
NASL id | PHP_UPDATE_VAR_OVERWRITE.NASL |
description | The remote host is running PHP-Update, a content management system written in PHP. The version of PHP-Update installed on the remote host fails to sanitize user-supplied arguments to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23927 |
published | 2006-12-20 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23927 |
title | PHP-Update blog.php Variable Overwriting Arbitrary Code Execution |
code |
|