Vulnerability Description
PHP remote file inclusion vulnerability in DoubleSpeak 0.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the config[private] parameter in multiple files, as demonstrated by (1) index.php, (2) faq.php, and (3) hardware.php. NOTE: this issue has been disputed by multiple third-party researchers, who state that config[private] is initialized in an include file before being used
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Iglooweb | Doublespeak | 0.1 |
References
- http://archives.neohapsis.com/archives/bugtraq/2006-06/0184.html
- http://attrition.org/pipermail/vim/2006-July/000935.html
- http://securitytracker.com/id?1016278Exploit
- http://www.aria-security.net/advisory/igloo/doublespeak.txt
- http://www.osvdb.org/27436
- http://www.securityfocus.com/bid/18401Exploit
- http://archives.neohapsis.com/archives/bugtraq/2006-06/0184.html
- http://attrition.org/pipermail/vim/2006-July/000935.html
- http://securitytracker.com/id?1016278Exploit
- http://www.aria-security.net/advisory/igloo/doublespeak.txt
- http://www.osvdb.org/27436
- http://www.securityfocus.com/bid/18401Exploit
FAQ
What is CVE-2006-3069?
CVE-2006-3069 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in DoubleSpeak 0.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the config[private] parameter in multiple files,...
How severe is CVE-2006-3069?
CVE-2006-3069 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3069?
Check the references section above for vendor advisories and patch information. Affected products include: Iglooweb Doublespeak.