Vulnerability Name: CVE-2006-2842 Assigned: 2006-06-01 Published: 2006-06-01 Updated: 2018-10-18 Summary: ** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. Note : this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: ALLOWS_OTHER_ACCESS References: Source: SGI Type: UNKNOWN20060703-01-P Source: MITRE Type: CNACVE-2006-2842 Source: CONFIRM Type: UNKNOWNhttp://docs.info.apple.com/article.html?artnum=306172 Source: APPLE Type: UNKNOWNAPPLE-SA-2007-07-31 Source: SECUNIA Type: Patch, Vendor Advisory20406 Source: SECUNIA Type: UNKNOWN20931 Source: SECUNIA Type: UNKNOWN21159 Source: SECUNIA Type: UNKNOWN21262 Source: SECUNIA Type: UNKNOWN26235 Source: SECTRACK Type: UNKNOWN1016209 Source: CONFIRM Type: Patchhttp://squirrelmail.cvs.sourceforge.net/squirrelmail/squirrelmail/functions/global.php?r1=1.27.2.16&r2=1.27.2.17&view=patch&pathrev=SM-1_4-STABLE Source: MANDRIVA Type: UNKNOWNMDKSA-2006:101 Source: SUSE Type: UNKNOWNSUSE-SR:2006:017 Source: REDHAT Type: UNKNOWNRHSA-2006:0547 Source: BUGTRAQ Type: UNKNOWN20060601 Squirrelmail local file inclusion Source: BID Type: Exploit18231 Source: BID Type: UNKNOWN25159 Source: CONFIRM Type: Patchhttp://www.squirrelmail.org/security/issue/2006-06-01 Source: VUPEN Type: UNKNOWNADV-2006-2101 Source: VUPEN Type: UNKNOWNADV-2007-2732 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:11670 Vulnerable Configuration: Configuration 1 :cpe:/a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:* OR cpe:/a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* (Version <= 1.4.6) OR cpe:/a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20062842 V CVE-2006-2842 2015-11-16 oval:org.mitre.oval:def:11670 V ** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable. 2013-04-29 oval:com.redhat.rhsa:def:20060547 P RHSA-2006:0547: squirrelmail security update (Moderate) 2006-07-03
BACK
squirrelmail squirrelmail 1.0.4
squirrelmail squirrelmail 1.0.5
squirrelmail squirrelmail 1.2.0
squirrelmail squirrelmail 1.2.1
squirrelmail squirrelmail 1.2.2
squirrelmail squirrelmail 1.2.3
squirrelmail squirrelmail 1.2.4
squirrelmail squirrelmail 1.2.5
squirrelmail squirrelmail 1.2.6
squirrelmail squirrelmail 1.2.7
squirrelmail squirrelmail 1.2.8
squirrelmail squirrelmail 1.2.9
squirrelmail squirrelmail 1.2.10
squirrelmail squirrelmail 1.2.11
squirrelmail squirrelmail 1.4
squirrelmail squirrelmail 1.4.0
squirrelmail squirrelmail 1.4.1
squirrelmail squirrelmail 1.4.2
squirrelmail squirrelmail 1.4.3
squirrelmail squirrelmail 1.4.3_r3
squirrelmail squirrelmail 1.4.3_rc1
squirrelmail squirrelmail 1.4.3a
squirrelmail squirrelmail 1.4.4
squirrelmail squirrelmail 1.4.4_rc1
squirrelmail squirrelmail 1.4.5
squirrelmail squirrelmail *
squirrelmail squirrelmail 1.4.6_rc1