CVE-ID

CVE-2006-1688

• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
Description
Multiple PHP remote file inclusion vulnerabilities in SQuery 4.5 and earlier, as used in products such as Autonomous LAN party (ALP), allow remote attackers to execute arbitrary PHP code via a URL in the libpath parameter to scripts in the lib directory including (1) ase.php, (2) devi.php, (3) doom3.php, (4) et.php, (5) flashpoint.php, (6) gameSpy.php, (7) gameSpy2.php, (8) gore.php, (9) gsvari.php, (10) halo.php, (11) hlife.php, (12) hlife2.php, (13) igi2.php, (14) main.lib.php, (15) netpanzer.php, (16) old_hlife.php, (17) pkill.php, (18) q2a.php, (19) q3a.php, (20) qworld.php, (21) rene.php, (22) rvbshld.php, (23) savage.php, (24) simracer.php, (25) sof1.php, (26) sof2.php, (27) unreal.php, (28) ut2004.php, and (29) vietcong.php. NOTE: the lib/armygame.php vector is already covered by CVE-2006-1610. The provenance of most of these additional vectors is unknown, although likely from post-disclosure analysis. NOTE: this only occurs when register_globals is disabled.
References
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
  • BID:17434
  • URL:http://www.securityfocus.com/bid/17434
  • BUGTRAQ:20060408 Autonomous LAN party File iNclusion
  • URL:http://www.securityfocus.com/archive/1/430289/100/0/threaded
  • BUGTRAQ:20060710 SQuery <= 4.5(libpath) Remote File Inclusion Exploit
  • URL:http://www.securityfocus.com/archive/1/439874/100/0/threaded
  • BUGTRAQ:20060724 SQuery v.x (devi.php) (armygame.php) Remote File Inclusion
  • URL:http://www.securityfocus.com/archive/1/441015/100/0/threaded
  • MISC:http://liz0zim.no-ip.org/alp.txt
  • MISC:http://www.blogcu.com/Liz0ziM/431845/
  • OSVDB:24401
  • URL:http://www.osvdb.org/24401 (Obsolete source)
  • OSVDB:24402
  • URL:http://www.osvdb.org/24402 (Obsolete source)
  • OSVDB:24403
  • URL:http://www.osvdb.org/24403 (Obsolete source)
  • OSVDB:24404
  • URL:http://www.osvdb.org/24404 (Obsolete source)
  • OSVDB:24405
  • URL:http://www.osvdb.org/24405 (Obsolete source)
  • OSVDB:24406
  • URL:http://www.osvdb.org/24406 (Obsolete source)
  • OSVDB:24407
  • URL:http://www.osvdb.org/24407 (Obsolete source)
  • OSVDB:24408
  • URL:http://www.osvdb.org/24408 (Obsolete source)
  • OSVDB:24409
  • URL:http://www.osvdb.org/24409 (Obsolete source)
  • OSVDB:24410
  • URL:http://www.osvdb.org/24410 (Obsolete source)
  • OSVDB:24411
  • URL:http://www.osvdb.org/24411 (Obsolete source)
  • OSVDB:24412
  • URL:http://www.osvdb.org/24412 (Obsolete source)
  • OSVDB:24413
  • URL:http://www.osvdb.org/24413 (Obsolete source)
  • OSVDB:24414
  • URL:http://www.osvdb.org/24414 (Obsolete source)
  • OSVDB:24415
  • URL:http://www.osvdb.org/24415 (Obsolete source)
  • OSVDB:24416
  • URL:http://www.osvdb.org/24416 (Obsolete source)
  • OSVDB:24417
  • URL:http://www.osvdb.org/24417 (Obsolete source)
  • OSVDB:24418
  • URL:http://www.osvdb.org/24418 (Obsolete source)
  • OSVDB:24419
  • URL:http://www.osvdb.org/24419 (Obsolete source)
  • OSVDB:24420
  • URL:http://www.osvdb.org/24420 (Obsolete source)
  • OSVDB:24421
  • URL:http://www.osvdb.org/24421 (Obsolete source)
  • OSVDB:24422
  • URL:http://www.osvdb.org/24422 (Obsolete source)
  • OSVDB:24423
  • URL:http://www.osvdb.org/24423 (Obsolete source)
  • OSVDB:24424
  • URL:http://www.osvdb.org/24424 (Obsolete source)
  • OSVDB:24425
  • URL:http://www.osvdb.org/24425 (Obsolete source)
  • OSVDB:24426
  • URL:http://www.osvdb.org/24426 (Obsolete source)
  • OSVDB:24427
  • URL:http://www.osvdb.org/24427 (Obsolete source)
  • OSVDB:24428
  • URL:http://www.osvdb.org/24428 (Obsolete source)
  • OSVDB:24429
  • URL:http://www.osvdb.org/24429 (Obsolete source)
  • SECTRACK:1015884
  • URL:http://securitytracker.com/id?1015884
  • SECUNIA:19482
  • URL:http://secunia.com/advisories/19482
  • SECUNIA:19588
  • URL:http://secunia.com/advisories/19588
  • SREASON:679
  • URL:http://securityreason.com/securityalert/679
  • VUPEN:ADV-2006-1284
  • URL:http://www.vupen.com/english/advisories/2006/1284 (Obsolete source)
Assigning CNA
MITRE Corporation
Date Record Created
20060410 Disclaimer: The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Assigned (20060410)
Votes (Legacy)
Comments (Legacy)
Proposed (Legacy)
N/A
This is an record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities.