Vulnerability Details : CVE-2006-1688
Potential exploit
Multiple PHP remote file inclusion vulnerabilities in SQuery 4.5 and earlier, as used in products such as Autonomous LAN party (ALP), allow remote attackers to execute arbitrary PHP code via a URL in the libpath parameter to scripts in the lib directory including (1) ase.php, (2) devi.php, (3) doom3.php, (4) et.php, (5) flashpoint.php, (6) gameSpy.php, (7) gameSpy2.php, (8) gore.php, (9) gsvari.php, (10) halo.php, (11) hlife.php, (12) hlife2.php, (13) igi2.php, (14) main.lib.php, (15) netpanzer.php, (16) old_hlife.php, (17) pkill.php, (18) q2a.php, (19) q3a.php, (20) qworld.php, (21) rene.php, (22) rvbshld.php, (23) savage.php, (24) simracer.php, (25) sof1.php, (26) sof2.php, (27) unreal.php, (28) ut2004.php, and (29) vietcong.php. NOTE: the lib/armygame.php vector is already covered by CVE-2006-1610. The provenance of most of these additional vectors is unknown, although likely from post-disclosure analysis. NOTE: this only occurs when register_globals is disabled.
Vulnerability category: File inclusion
Products affected by CVE-2006-1688
- cpe:2.3:a:squery:squery:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1688
18.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1688
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2006-1688
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-1688
-
http://securitytracker.com/id?1015884
Exploit
-
http://www.blogcu.com/Liz0ziM/431845/
Exploit
-
http://www.vupen.com/english/advisories/2006/1284
Vendor Advisory
-
http://www.securityfocus.com/archive/1/439874/100/0/threaded
-
http://www.securityfocus.com/archive/1/430289/100/0/threaded
-
http://liz0zim.no-ip.org/alp.txt
Exploit
-
http://securityreason.com/securityalert/679
-
http://www.securityfocus.com/archive/1/441015/100/0/threaded
-
http://www.securityfocus.com/bid/17434
Exploit
Jump to