CVE-2006-2315

PHP remote file inclusion vulnerability in session.inc.php in ISPConfig 2.2.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the go_info[server][classes_root] parameter. NOTE: the vendor has disputed this vulnerability, saying that session.inc.php is not under the web root in version 2.2, and register_globals is not enabled
Configurations

Configuration 1 (hide)

cpe:2.3:a:ispconfig:ispconfig:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045855.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045855.html -
References () http://secunia.com/advisories/19994 - Vendor Advisory () http://secunia.com/advisories/19994 - Vendor Advisory
References () http://www.howtoforge.com/forums/showthread.php?t=4123 - () http://www.howtoforge.com/forums/showthread.php?t=4123 -
References () http://www.osvdb.org/25355 - () http://www.osvdb.org/25355 -
References () http://www.securityfocus.com/archive/1/437456/100/200/threaded - () http://www.securityfocus.com/archive/1/437456/100/200/threaded -
References () http://www.securityfocus.com/bid/17909 - Exploit () http://www.securityfocus.com/bid/17909 - Exploit
References () http://www.vupen.com/english/advisories/2006/1727 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/1727 - Vendor Advisory
References () http://www.xorcrew.net/xpa/XPA-ISPConfig.txt - Exploit, Vendor Advisory () http://www.xorcrew.net/xpa/XPA-ISPConfig.txt - Exploit, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26299 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26299 -
References () https://www.exploit-db.com/exploits/1762 - () https://www.exploit-db.com/exploits/1762 -

07 Nov 2023, 01:58

Type Values Removed Values Added
Summary ** DISPUTED ** PHP remote file inclusion vulnerability in session.inc.php in ISPConfig 2.2.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the go_info[server][classes_root] parameter. NOTE: the vendor has disputed this vulnerability, saying that session.inc.php is not under the web root in version 2.2, and register_globals is not enabled. PHP remote file inclusion vulnerability in session.inc.php in ISPConfig 2.2.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the go_info[server][classes_root] parameter. NOTE: the vendor has disputed this vulnerability, saying that session.inc.php is not under the web root in version 2.2, and register_globals is not enabled

Information

Published : 2006-05-12 00:02

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2315

Mitre link : CVE-2006-2315

CVE.ORG link : CVE-2006-2315


JSON object : View

Products Affected

ispconfig

  • ispconfig
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')