GHSA-7X4Q-26XJ-GJR7
Vulnerability from github – Published: 2022-05-01 06:42 – Updated: 2025-01-16 21:30** DISPUTED ** Multiple PHP remote file include vulnerabilities in dotProject 2.0.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary commands via the baseDir parameter in (1) db_adodb.php, (2) db_connect.php, (3) session.php, (4) vw_usr_roles.php, (5) calendar.php, (6) date_format.php, and (7) tasks/gantt.php; and the dPconfig[root_dir] parameter in (8) projects/gantt.php, (9) gantt2.php, and (10) vw_files.php. NOTE: the vendor disputes this issue, stating that the product documentation clearly recommends that the system administrator disable register_globals, and that the check.php script warns against this setting. Also, the vendor says that the protection.php/siteurl vector is incorrect because protection.php does not exist in the product.
{
"affected": [],
"aliases": [
"CVE-2006-0755"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2006-02-18T02:02:00Z",
"severity": "MODERATE"
},
"details": "** DISPUTED ** Multiple PHP remote file include vulnerabilities in dotProject 2.0.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary commands via the baseDir parameter in (1) db_adodb.php, (2) db_connect.php, (3) session.php, (4) vw_usr_roles.php, (5) calendar.php, (6) date_format.php, and (7) tasks/gantt.php; and the dPconfig[root_dir] parameter in (8) projects/gantt.php, (9) gantt2.php, and (10) vw_files.php. NOTE: the vendor disputes this issue, stating that the product documentation clearly recommends that the system administrator disable register_globals, and that the check.php script warns against this setting. Also, the vendor says that the protection.php/siteurl vector is incorrect because protection.php does not exist in the product.",
"id": "GHSA-7x4q-26xj-gjr7",
"modified": "2025-01-16T21:30:54Z",
"published": "2022-05-01T06:42:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0755"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24738"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/18879"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23209"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23210"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23211"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23212"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23213"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23214"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23215"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23216"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23217"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23218"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/23219"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/424957/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/425285/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/16648"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2006/0604"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.