Vulnerability Name: | CVE-2006-2842 |
Assigned: | 2006-06-01 |
Published: | 2006-06-01 |
Updated: | 2018-10-18 |
Summary: | ** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. Note: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable. |
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | ALLOWS_OTHER_ACCESS |
References: | Source: SGI Type: UNKNOWN 20060703-01-P
Source: MITRE Type: CNA CVE-2006-2842
Source: CONFIRM Type: UNKNOWN http://docs.info.apple.com/article.html?artnum=306172
Source: APPLE Type: UNKNOWN APPLE-SA-2007-07-31
Source: SECUNIA Type: Patch, Vendor Advisory 20406
Source: SECUNIA Type: UNKNOWN 20931
Source: SECUNIA Type: UNKNOWN 21159
Source: SECUNIA Type: UNKNOWN 21262
Source: SECUNIA Type: UNKNOWN 26235
Source: SECTRACK Type: UNKNOWN 1016209
Source: CONFIRM Type: Patch http://squirrelmail.cvs.sourceforge.net/squirrelmail/squirrelmail/functions/global.php?r1=1.27.2.16&r2=1.27.2.17&view=patch&pathrev=SM-1_4-STABLE
Source: MANDRIVA Type: UNKNOWN MDKSA-2006:101
Source: SUSE Type: UNKNOWN SUSE-SR:2006:017
Source: REDHAT Type: UNKNOWN RHSA-2006:0547
Source: BUGTRAQ Type: UNKNOWN 20060601 Squirrelmail local file inclusion
Source: BID Type: Exploit 18231
Source: BID Type: UNKNOWN 25159
Source: CONFIRM Type: Patch http://www.squirrelmail.org/security/issue/2006-06-01
Source: VUPEN Type: UNKNOWN ADV-2006-2101
Source: VUPEN Type: UNKNOWN ADV-2007-2732
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11670
|
Vulnerable Configuration: | Configuration 1: cpe:/a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*OR cpe:/a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* (Version <= 1.4.6)OR cpe:/a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.opensuse.security:def:20062842 | V | CVE-2006-2842 | 2015-11-16 | oval:org.mitre.oval:def:11670 | V | ** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable. | 2013-04-29 | oval:com.redhat.rhsa:def:20060547 | P | RHSA-2006:0547: squirrelmail security update (Moderate) | 2006-07-03 |
|
BACK |
squirrelmail squirrelmail 1.0.4
squirrelmail squirrelmail 1.0.5
squirrelmail squirrelmail 1.2.0
squirrelmail squirrelmail 1.2.1
squirrelmail squirrelmail 1.2.2
squirrelmail squirrelmail 1.2.3
squirrelmail squirrelmail 1.2.4
squirrelmail squirrelmail 1.2.5
squirrelmail squirrelmail 1.2.6
squirrelmail squirrelmail 1.2.7
squirrelmail squirrelmail 1.2.8
squirrelmail squirrelmail 1.2.9
squirrelmail squirrelmail 1.2.10
squirrelmail squirrelmail 1.2.11
squirrelmail squirrelmail 1.4
squirrelmail squirrelmail 1.4.0
squirrelmail squirrelmail 1.4.1
squirrelmail squirrelmail 1.4.2
squirrelmail squirrelmail 1.4.3
squirrelmail squirrelmail 1.4.3_r3
squirrelmail squirrelmail 1.4.3_rc1
squirrelmail squirrelmail 1.4.3a
squirrelmail squirrelmail 1.4.4
squirrelmail squirrelmail 1.4.4_rc1
squirrelmail squirrelmail 1.4.5
squirrelmail squirrelmail *
squirrelmail squirrelmail 1.4.6_rc1