Vulnerability CVE-2006-1688


Published: 2006-04-10   Modified: 2012-02-12

Description:
Multiple PHP remote file inclusion vulnerabilities in SQuery 4.5 and earlier, as used in products such as Autonomous LAN party (ALP), allow remote attackers to execute arbitrary PHP code via a URL in the libpath parameter to scripts in the lib directory including (1) ase.php, (2) devi.php, (3) doom3.php, (4) et.php, (5) flashpoint.php, (6) gameSpy.php, (7) gameSpy2.php, (8) gore.php, (9) gsvari.php, (10) halo.php, (11) hlife.php, (12) hlife2.php, (13) igi2.php, (14) main.lib.php, (15) netpanzer.php, (16) old_hlife.php, (17) pkill.php, (18) q2a.php, (19) q3a.php, (20) qworld.php, (21) rene.php, (22) rvbshld.php, (23) savage.php, (24) simracer.php, (25) sof1.php, (26) sof2.php, (27) unreal.php, (28) ut2004.php, and (29) vietcong.php. NOTE: the lib/armygame.php vector is already covered by CVE-2006-1610. The provenance of most of these additional vectors is unknown, although likely from post-disclosure analysis. NOTE: this only occurs when register_globals is disabled.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Autonomous LAN party File iNclusion
codexploder linu...
10.04.2006

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Squery -> Squery 

 References:
http://liz0zim.no-ip.org/alp.txt
http://securityreason.com/securityalert/679
http://securitytracker.com/id?1015884
http://www.blogcu.com/Liz0ziM/431845/
http://www.securityfocus.com/archive/1/430289/100/0/threaded
http://www.securityfocus.com/archive/1/439874/100/0/threaded
http://www.securityfocus.com/archive/1/441015/100/0/threaded
http://www.securityfocus.com/bid/17434
http://www.vupen.com/english/advisories/2006/1284

Copyright 2024, cxsecurity.com

 

Back to Top