Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2006-2842

EPSS 0.94% · P76
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2006-2842

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Squirrelmail plugin.php PHP远程文件包含漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SquirrelMail是一个多功能的用PHP4实现的Webmail程序,可运行于Linux/Unix类操作系统下。 Squirrelmail 1.4.6版本的functions/plugin.php文件中存在文件包含漏洞。远程攻击者可借助插件数组参数中的URL执行任意PHP代码。 相关代码如下: if (isset($plugins) & & is_array($plugins)) { foreach ($plugins as $name) { use_plugin($name); } ... func
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2006-2842

#POC DescriptionSource LinkShenlong Link
1CVE-2006-2842 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.https://github.com/karthi-the-hacker/CVE-2006-2842POC Details
2SquirrelMail 1.4.6 and earlier versions are susceptible to a PHP local file inclusion vulnerability in functions/plugin.php if register_globals is enabled and magic_quotes_gpc is disabled. This allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2006/CVE-2006-2842.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2006-2842

登录查看更多情报信息。

Same Patch Batch · n/a · 2006-06-06 · 54 CVEs total

CVE-2006-2861Particle Wiki Index.PHP SQL注入漏洞
CVE-2006-2832Drupal upload模块 跨站脚本攻击(XSS)漏洞
CVE-2006-2871CyBoards PHP Lite common.php 远程文件包含漏洞
CVE-2006-2874OSADS Alliance Database 未明漏洞
CVE-2006-2873Enigma Haber hava.asp 跨站脚本攻击漏洞
CVE-2006-2872Rumble config.php PHP远程文件包含漏洞
CVE-2006-2831Drupal 多个输入验证漏洞
CVE-2006-2864BlueShoes Framework 多个远程文件包含漏洞
CVE-2006-2863CS-Cart Class.cs_phpmailer.PHP 远程文件包含漏洞
CVE-2006-2862Particle Gallery Viewimage.PHP SQL注入漏洞
CVE-2006-2865phpBB template.php 远程文件包含漏洞
CVE-2006-2860WebspotBlogging 多个远程文件包含漏洞
CVE-2006-2859MyBloggie 多个远程文件包含漏洞
CVE-2006-2858LocazoList Classifieds Viewmsg.ASP SQL注入漏洞
CVE-2006-2857LifeType index.php SQL注入漏洞
CVE-2006-2856ActiveState ActivePerl 本地权限提升漏洞
CVE-2006-2855XUEBook Index.PHP SQL注入漏洞
CVE-2006-2854IBWd Guestbook Index.PHP SQL注入漏洞
CVE-2006-2853Abarcar Realty Portal Content.PHP SQL注入漏洞
CVE-2006-2852DotWidget CMS 多个远程文件包含漏洞

Showing top 20 of 54 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2006-2842

No comments yet


Leave a comment