{ "id": "CVE-2006-0636", "sourceIdentifier": "cve@mitre.org", "published": "2006-02-10T11:02:00.000", "lastModified": "2024-11-21T00:06:58.387", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "desktop.php in eyeOS 0.8.9 and earlier tests for the existence of the _SESSION variable before calling the session_start function, which allows remote attackers to execute arbitrary PHP code and possibly conduct other attacks by modifying critical assumed-immutable variables, as demonstrated using PHP code in the _SESSION[apps][eyeOptions.eyeapp][wrapup] variable." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "88C9B6C0-DF66-4592-BD8E-F0E7E06DC8F3" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A6255DDE-ABAC-440E-BD17-E121B4E40EE5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.1_r1:*:*:*:*:*:*:*", "matchCriteriaId": "1BB7BD4C-EB42-43B0-B492-F5F03A339CB2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "4174D891-C2CB-47F7-95C3-03292BF11B35" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.2_r1:*:*:*:*:*:*:*", "matchCriteriaId": "3EFCEF02-41F5-4C4D-8266-1D6AA09D6DF7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.2_r2:*:*:*:*:*:*:*", "matchCriteriaId": "BFC1C715-5440-4673-AC2E-9A7CBDD16A63" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.2_r3:*:*:*:*:*:*:*", "matchCriteriaId": "99490285-2E1F-4E6F-AFF7-2A3E84CEE134" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "F3260F95-A78A-4115-9C93-6731218A4687" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.3_r1:*:*:*:*:*:*:*", "matchCriteriaId": "C2FC74C0-9943-4723-8538-26C366FB2006" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.3_r2:*:*:*:*:*:*:*", "matchCriteriaId": "99E79EAD-72FD-4843-8852-441FEF825D91" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "021FDB55-22B2-4A39-A5FD-E85EFB4024D1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.4_r1:*:*:*:*:*:*:*", "matchCriteriaId": "14B150B0-0AC8-4F67-AB97-5113E1B542E1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "0AACA458-4CE7-4DCA-AA04-D31530318B96" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.5_r1:*:*:*:*:*:*:*", "matchCriteriaId": "16543AB3-42F8-4074-92AB-4376B254D105" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "A861A748-968A-4ABC-B484-2229F5EACB23" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "B2F3C522-2CCA-443C-902F-53D7AC3A5B62" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "66F2B54D-3B7E-426E-9028-104B1340FB7E" }, { "vulnerable": true, "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "B1BE703A-8086-4EE2-83F1-646B95DB52ED" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/18757", "source": "cve@mitre.org" }, { "url": "http://securityreason.com/securityalert/419", "source": "cve@mitre.org" }, { "url": "http://securitytracker.com/id?1015609", "source": "cve@mitre.org" }, { "url": "http://www.gulftech.org/?node=research&article_id=00096-02072006", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/archive/1/424329/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/16537", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2006/0466", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24569", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/18757", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://securityreason.com/securityalert/419", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://securitytracker.com/id?1015609", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.gulftech.org/?node=research&article_id=00096-02072006", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/archive/1/424329/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/16537", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2006/0466", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24569", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }