5.1
CVSSv2

CVE-2006-0755

Published: 18/02/2006 Updated: 14/05/2024
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 560
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple PHP remote file include vulnerabilities in dotProject 2.0.1 and previous versions, when register_globals is enabled, allow remote malicious users to execute arbitrary commands via the baseDir parameter in (1) db_adodb.php, (2) db_connect.php, (3) session.php, (4) vw_usr_roles.php, (5) calendar.php, (6) date_format.php, and (7) tasks/gantt.php; and the dPconfig[root_dir] parameter in (8) projects/gantt.php, (9) gantt2.php, and (10) vw_files.php. NOTE: the vendor disputes this issue, stating that the product documentation clearly recommends that the system administrator disable register_globals, and that the check.php script warns against this setting. Also, the vendor says that the protection.php/siteurl vector is incorrect because protection.php does not exist in the product

Vulnerable Product Search on Vulmon Subscribe to Product

dotproject dotproject 2.0

dotproject dotproject 2.0.1

Exploits

source: wwwsecurityfocuscom/bid/16648/info Dotproject is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute i ...
source: wwwsecurityfocuscom/bid/16648/info Dotproject is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context ...
source: wwwsecurityfocuscom/bid/16648/info Dotproject is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the ...
source: wwwsecurityfocuscom/bid/16648/info Dotproject is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the c ...
source: wwwsecurityfocuscom/bid/16648/info Dotproject is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in t ...
source: wwwsecurityfocuscom/bid/16648/info Dotproject is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the con ...
source: wwwsecurityfocuscom/bid/16648/info Dotproject is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it ...
source: wwwsecurityfocuscom/bid/16648/info Dotproject is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in ...
source: wwwsecurityfocuscom/bid/16648/info Dotproject is prone to multiple remote file-include vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the conte ...
:::::::- :::::: ::: ;;, `';, ;; ;;;`;;;;, `;;; `[[ [[[[' [[[ [[[[[ '[[ $$, $$$$ $$$ $$$ "Y$c$$ 888_,o8P'88 d888 888 Y88 MMMMP"` "YmmMMMM"" MMM YM [ Discovered by dun \ posdub[at]gmailcom ] [ 2012-11-13 ] ################################ ...