CVE-2006-2842
Published Jun 6, 2006
Last updated 3 months ago
Overview
- Description
- PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable
- Source
- cve@mitre.org
- NVD status
- Modified
- CNA Tags
- disputed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72558D26-AFC8-450A-9642-7A657119DED8", "versionEndIncluding": "1.4.6" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67E9817E-FF56-4FD0-B6C7-F4EEB25AD0CF" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EBF40C5-6272-427C-97A1-3CE3B1D47B12" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A55A98B3-34ED-4A90-BB78-50CB56B1B51F" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC5143ED-D4C5-4830-9C96-0B54D03679CB" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B765AEC-09E9-456C-8B57-09927E55D119" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AAFC3B0-DCE3-4190-B279-E095C666FA34" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9291A565-0BD6-4B5E-B45F-9DE65AB8159D" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6F53A84-FC66-4963-A728-7285F63D4761" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69A941FF-423E-49C5-AE1F-FE7ED016CA3D" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B34FDB1D-881B-4343-A76E-F23B93A0469A" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E4DCB20-2A7F-4EE4-BAFA-AD74CD4456AB" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "052914F8-B52C-4AB4-8F85-68D788B588C9" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "617C554F-8E7D-4F8A-AF63-C193934C8215" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15F11950-A2E4-4F57-BF87-57788B841A21" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "026730B8-3919-4100-8607-C640ADBDD662" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C179A3C-8C8C-429B-BACA-8ADAE4170465" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AD31177-05BB-4623-AED7-765DB7E44E47" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20247A22-9AB9-4BCE-BF28-350B52FBC62D" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79E6734C-EE1C-40B6-9759-15298707A6F5" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6733B8C-5A9E-45CE-8938-F39A69EB0DC1" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B08E51F1-3764-4146-89C1-20B9B8EE1222" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD4071B2-3D4F-4755-98B1-E28CEB05EA8B" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF6591E5-5F36-4663-85A6-9D870FD49FC7" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D062B70A-E5FF-403B-8BD1-777D6462B7CC" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D4CFD4D-EAC3-4325-A87F-9D5F4C513208" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7ED3CC3-E0A8-4C20-9EF7-405CD32E9EF7" } ], "operator": "OR" } ] } ]