ID CVE-2006-1551
Summary Eval injection vulnerability in pajax_call_dispatcher.php in PAJAX 0.5.1 and earlier allows remote attackers to execute arbitrary code via the (1) $method and (2) $args parameters.
References
Vulnerable Configurations
  • cpe:2.3:a:georges_auberger:pajax:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:georges_auberger:pajax:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:georges_auberger:pajax:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:georges_auberger:pajax:0.5.1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 18-10-2018 - 16:33)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 17519
bugtraq 20060413 PAJAX Remote Code Injection and File Inclusion Vulnerability
fulldisc 20060413 PAJAX Remote file inclusion and File Inclusion Vulnerability
misc http://www.redteam-pentesting.de/advisories/rt-sa-2006-001.php
osvdb 24618
secunia 19653
vupen ADV-2006-1353
xf pajax-pajaxcalldispatcher-code-execution(25859)
Last major update 18-10-2018 - 16:33
Published 13-04-2006 - 22:02
Last modified 18-10-2018 - 16:33
Back to Top