cve/2006/CVE-2006-2842.md

22 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2006-2842](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2842)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cappricio-Securities/CVE-2021-20323
2024-07-25 21:25:12 +00:00
- https://github.com/gnarkill78/CSA_S2_2024
2024-05-26 14:27:05 +02:00
- https://github.com/karthi-the-hacker/CVE-2006-2842