Vulnerability Name:

CVE-2006-0144 (CCN-24076)

Assigned:2006-01-08
Published:2006-01-08
Updated:2018-10-19
Summary:The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-94
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Apache2Triad Web site
Apache2Triad Insecure PEAR Installer Security Issue

Source: CONFIRM
Type: UNKNOWN
http://apache2triad.net/forums/viewtopic.php?p=14670

Source: CCN
Type: BugTraq Mailing List, Sun Jan 08 2006 - 21:42:03 CST
New PEAR / Apache2Triad Exploit

Source: MITRE
Type: CNA
CVE-2006-0144

Source: CCN
Type: go-pear.org
go-pear.php

Source: CCN
Type: SA18390
Apache2Triad Insecure PEAR Installer Security Issue

Source: SECUNIA
Type: Patch, Vendor Advisory
18390

Source: CCN
Type: OSVDB ID: 22331
PEAR go-pear.php Proxy Setting Manipulation Arbitrary Command Execution

Source: BUGTRAQ
Type: UNKNOWN
20060109 New PEAR / Apache2Triad Exploit

Source: BID
Type: UNKNOWN
16174

Source: CCN
Type: BID-16174
PHP PEAR Go-Pear.PHP Arbitrary Remote Code Execution Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2006-0148

Source: XF
Type: UNKNOWN
gopear-proxy-redirection(24076)

Source: XF
Type: UNKNOWN
gopear-proxy-redirection(24076)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache2triad:apache2triad:*:*:*:*:*:*:*:*
  • OR cpe:/a:php:pear:0.2.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apache2triad apache2triad *
    php pear 0.2.2