CVE-2006-0755 (CNNVD-200602-266)
中文标题:
Dotproject多个远程文件包含漏洞
英文标题:
Multiple PHP remote file include vulnerabilities in dotProject 2.0.1 and earlier, when register_glob...
漏洞描述
中文描述:
dotproject是一个PHP+MySql编写的beta级基于web的项目管理和跟踪工具。 dotproject实现上存在多个输入验证漏洞,远程攻击者可能利用这些漏洞在系统上执行任意命令。 dotproject的protection.php脚本没有正确地验证siteurl参数中的用户输入,因此攻击者可以通过eval()包含远程PHP文件并执行任意PHP代码。此外,还有一些路径泄露漏洞。如果使用baseDir=foobar参数直接访问的话,几乎所有/db/中的文件都可能出现一些可利用的php错误。如果没有删除/doc/目录的话(默认配置),就可以访问以下两个文件泄漏系统信息: 1) /docs/phpinfo.php - phpinfo()文件 2) /docs/check.php - 有关所安装的dotProject的信息
英文描述:
Multiple PHP remote file include vulnerabilities in dotProject 2.0.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary commands via the baseDir parameter in (1) db_adodb.php, (2) db_connect.php, (3) session.php, (4) vw_usr_roles.php, (5) calendar.php, (6) date_format.php, and (7) tasks/gantt.php; and the dPconfig[root_dir] parameter in (8) projects/gantt.php, (9) gantt2.php, and (10) vw_files.php. NOTE: the vendor disputes this issue, stating that the product documentation clearly recommends that the system administrator disable register_globals, and that the check.php script warns against this setting. Also, the vendor says that the protection.php/siteurl vector is incorrect because protection.php does not exist in the product
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| dotproject | dotproject | 2.0 | - | - |
cpe:2.3:a:dotproject:dotproject:2.0:*:*:*:*:*:*:*
|
| dotproject | dotproject | 2.0.1 | - | - |
cpe:2.3:a:dotproject:dotproject:2.0.1:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
CVSS评分详情
3.1 (adp)
MEDIUMCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2006-0755 |
2025-11-11 15:17:39 | 2025-11-11 07:32:31 |
| NVD | nvd_CVE-2006-0755 |
2025-11-11 14:51:47 | 2025-11-11 07:41:17 |
| CNNVD | cnnvd_CNNVD-200602-266 |
2025-11-11 15:08:50 | 2025-11-11 07:49:04 |
| EXPLOITDB | exploitdb_EDB-22708 |
2025-11-11 15:05:33 | 2025-11-11 08:17:54 |
| EXPLOITDB | exploitdb_EDB-27217 |
2025-11-11 15:05:33 | 2025-11-11 08:23:30 |
| EXPLOITDB | exploitdb_EDB-27218 |
2025-11-11 15:05:33 | 2025-11-11 08:23:30 |
| EXPLOITDB | exploitdb_EDB-27219 |
2025-11-11 15:05:33 | 2025-11-11 08:23:30 |
| EXPLOITDB | exploitdb_EDB-27220 |
2025-11-11 15:05:33 | 2025-11-11 08:23:30 |
| EXPLOITDB | exploitdb_EDB-27221 |
2025-11-11 15:05:33 | 2025-11-11 08:23:30 |
| EXPLOITDB | exploitdb_EDB-27222 |
2025-11-11 15:05:33 | 2025-11-11 08:23:30 |
| EXPLOITDB | exploitdb_EDB-27223 |
2025-11-11 15:05:33 | 2025-11-11 08:23:30 |
| EXPLOITDB | exploitdb_EDB-27224 |
2025-11-11 15:05:33 | 2025-11-11 08:23:30 |
| EXPLOITDB | exploitdb_EDB-27225 |
2025-11-11 15:05:33 | 2025-11-11 08:23:30 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 36 -> 38
- tags_count: 13 -> 14
查看详细变更
- references_count: 34 -> 36
- tags_count: 12 -> 13
查看详细变更
- references_count: 32 -> 34
- tags_count: 11 -> 12
查看详细变更
- references_count: 30 -> 32
- tags_count: 10 -> 11
查看详细变更
- references_count: 28 -> 30
- tags_count: 9 -> 10
查看详细变更
- references_count: 26 -> 28
- tags_count: 8 -> 9
查看详细变更
- references_count: 24 -> 26
- tags_count: 7 -> 8
查看详细变更
- references_count: 22 -> 24
- tags_count: 6 -> 7
查看详细变更
- references_count: 20 -> 22
- tags_count: 5 -> 6
查看详细变更
- references_count: 17 -> 20
- tags_count: 0 -> 5
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200602-266
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 0 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']