CVE-2006-2842 (CNNVD-200606-129)
中文标题:
Squirrelmail plugin.php PHP远程文件包含漏洞
英文标题:
PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, i...
漏洞描述
中文描述:
SquirrelMail是一个多功能的用PHP4实现的Webmail程序,可运行于Linux/Unix类操作系统下。 Squirrelmail 1.4.6版本的functions/plugin.php文件中存在文件包含漏洞。远程攻击者可借助插件数组参数中的URL执行任意PHP代码。 相关代码如下: if (isset($plugins) & & is_array($plugins)) { foreach ($plugins as $name) { use_plugin($name); } ... function use_plugin ($name) { if (file_exists(SM_PATH . "plugins/$name/setup.php")) { include_once(SM_PATH . "plugins/$name/setup.php"); $function = "squirrelmail_plugin_init_$name"; if (function_exists($function)) { $function(); } } } .... 如果打开了register_globals功能的话,攻击者就可以控制$name变量,导致执行任意代码。
英文描述:
PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| squirrelmail | squirrelmail | * | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.0.4 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.0.5 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.0 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.1 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.2 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.3 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.4 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.5 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.6 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.7 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.8 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.9 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.10 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.2.11 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.0 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.1 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.2 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.3 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.3_r3 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.3_rc1 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.3a | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.4 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.4_rc1 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.5 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*
|
| squirrelmail | squirrelmail | 1.4.6_rc1 | - | - |
cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
AV:N/AC:L/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2006-2842 |
2025-11-11 15:17:42 | 2025-11-11 07:32:34 |
| NVD | nvd_CVE-2006-2842 |
2025-11-11 14:51:49 | 2025-11-11 07:41:20 |
| CNNVD | cnnvd_CNNVD-200606-129 |
2025-11-11 15:08:51 | 2025-11-11 07:49:07 |
| EXPLOITDB | exploitdb_EDB-27948 |
2025-11-11 15:05:43 | 2025-11-11 08:23:51 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 20 -> 23
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200606-129
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 27
- data_sources: ['cve'] -> ['cve', 'nvd']