Vulnerabilities > CVE-2006-6795 - Unspecified vulnerability in Myphpnuke MY Egallery 2.5.6

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
myphpnuke
nessus
exploit available

Summary

PHP remote file inclusion vulnerability in gallery/displayCategory.php in the My_eGallery 2.5.6 module in myPHPNuke (MPN) allows remote attackers to execute arbitrary PHP code via a URL in the basepath parameter.

Vulnerable Configurations

Part Description Count
Application
Myphpnuke
1

Exploit-Db

descriptionmyphpNuke Module My_eGallery 2.5.6 (basepath) RFI Vulnerability. CVE-2006-6795. Webapps exploit for php platform
fileexploits/php/webapps/3010.txt
idEDB-ID:3010
last seen2016-01-31
modified2006-12-25
platformphp
port
published2006-12-25
reporterMehmet Ince
sourcehttps://www.exploit-db.com/download/3010/
titlemyphpNuke Module My_eGallery 2.5.6 basepath RFI Vulnerability
typewebapps

Nessus

NASL familyCGI abuses
NASL idMYPHPNUKE_CODE_INJECTION.NASL
descriptionThe remote web server appears to be running myPHPNuke. The installed version is affected by a remote file include vulnerability in the
last seen2020-06-01
modified2020-06-02
plugin id11836
published2003-09-12
reporterThis script is Copyright (C) 2003-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11836
titlemyPHPNuke My_eGallery gallery/displayCategory.php basepath Parameter Remote File Inclusion
code
#
# (C) Tenable Network Security, Inc.
#

#
# Ref:
# From: "Frog Man" <[email protected]>
# To: [email protected], [email protected]
# Subject: myPHPNuke : Copy/Upload/Include Files
# Date: Thu, 11 Sep 2003 12:14:09 +0200



include("compat.inc");

if(description)
{
  script_id(11836);
  script_version ("1.20");

  script_cve_id("CVE-2006-6795");

  script_name(english:"myPHPNuke My_eGallery gallery/displayCategory.php basepath Parameter Remote File Inclusion");
  script_summary(english:"Checks for the presence of displayCategory.php");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server is hosting a PHP application that is affected
by a remote file include vulnerability.." );
  script_set_attribute(attribute:"description", value:
"The remote web server appears to be running myPHPNuke. The installed
version is affected by a remote file include vulnerability in the
'gallery/displayCategory.php' script. An  attacker may use this flaw
to inject arbitrary code in the remote host and gain a shell with the
privileges of the web server." );

  script_set_attribute(attribute:"see_also", value:"https://seclists.org/vulnwatch/2003/q3/100" );
  script_set_attribute(attribute:"solution", value:"There is no known solution at this time." );

  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2006-6795");

  script_set_attribute(attribute:"plugin_publication_date", value: "2003/09/12");
  script_set_attribute(attribute:"vuln_publication_date", value: "2006/12/26");
  script_cvs_date("Date: 2019/05/31 10:05:08");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();
 
  script_category(ACT_ATTACK);
  script_copyright(english:"This script is Copyright (C) 2003-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"CGI abuses");

  script_dependencie("find_service1.nasl", "http_version.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_keys("www/PHP");
  exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);
if(!can_host_php(port:port))exit(0);

function check(loc)
{
  local_var res;

  res = http_send_recv3(method:"GET", item:string(loc, "/gallery/displayCategory.php?basepath=http://example.com"), port:port);
  if (isnull(res)) exit(1, "The web server on port "+port+" failed to respond.");

  if("http://example.com/imageFunctions.php" >< res[2])
  {
    security_hole(port);
    exit(0);
  }
}

foreach dir (cgi_dirs())
{
  check(loc:dir);
}