ID CVE-2006-3042
Summary Multiple PHP remote file inclusion vulnerabilities in ISPConfig 2.2.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) go_info[isp][classes_root] parameter in (a) server.inc.php, and the (2) go_info[server][classes_root] parameter in (b) app.inc.php, (c) login.php, and (d) trylogin.php. NOTE: this issue has been disputed by the vendor, who states that the original researcher "reviewed the installation tarball that is not identical with the resulting system after installtion. The file, where the $go_info array is declared ... is created by the installer.
References
Vulnerable Configurations
  • cpe:2.3:a:ispconfig:ispconfig:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:ispconfig:ispconfig:2.2.3:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 07-08-2024 - 19:15)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 18441
bugtraq
  • 20060614 [FSA016] ISPConfig 2.2.3, File inclusion vulnerability
  • 20060616 Re: [FSA016] ISPConfig 2.2.3, File inclusion vulnerability
osvdb 27474
sreason 1098
Last major update 07-08-2024 - 19:15
Published 15-06-2006 - 10:02
Last modified 07-08-2024 - 19:15
Back to Top