Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-1551

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2006-1551
Last Modified 07 Mar 2011 09:33:18
Published 13 Apr 2006 06:02:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-1551

Summary

Eval injection vulnerability in pajax_call_dispatcher.php in PAJAX 0.5.1 and earlier allows remote attackers to execute arbitrary code via the (1) $method and (2) $args parameters.

Vulnerable Systems

Application

  • Georges Auberger Pajax 0.5.0

  • Georges Auberger Pajax 0.5.1


References

VUPEN - ADV-2006-1353

MISC - http://www.redteam-pentesting.de/advisories/rt-sa-2006-001.php

XF - pajax-pajaxcalldispatcher-code-execution(25859)

BID - 17519

BUGTRAQ - 20060413 PAJAX Remote Code Injection and File Inclusion Vulnerability

OSVDB - 24618

SECUNIA - 19653

FULLDISC - 20060413 PAJAX Remote file inclusion and File Inclusion Vulnerability


Last Updated: 27 May 2016 10:42:06