TROYANOSYVIRUS
Back to CVEs

CVE-2006-1688

N/A

Description

Multiple PHP remote file inclusion vulnerabilities in SQuery 4.5 and earlier, as used in products such as Autonomous LAN party (ALP), allow remote attackers to execute arbitrary PHP code via a URL in the libpath parameter to scripts in the lib directory including (1) ase.php, (2) devi.php, (3) doom3.php, (4) et.php, (5) flashpoint.php, (6) gameSpy.php, (7) gameSpy2.php, (8) gore.php, (9) gsvari.php, (10) halo.php, (11) hlife.php, (12) hlife2.php, (13) igi2.php, (14) main.lib.php, (15) netpanzer.php, (16) old_hlife.php, (17) pkill.php, (18) q2a.php, (19) q3a.php, (20) qworld.php, (21) rene.php, (22) rvbshld.php, (23) savage.php, (24) simracer.php, (25) sof1.php, (26) sof2.php, (27) unreal.php, (28) ut2004.php, and (29) vietcong.php. NOTE: the lib/armygame.php vector is already covered by CVE-2006-1610. The provenance of most of these additional vectors is unknown, although likely from post-disclosure analysis. NOTE: this only occurs when register_globals is disabled.

CVE Details

CVSS v3.1 ScoreN/A
Published4/11/2006
Last Modified4/16/2026
Sourcenvd
Honeypot Sightings0

Affected Products

squery:squery

Weaknesses (CWE)

CWE-94

References

http://liz0zim.no-ip.org/alp.txt(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19482(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19588(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/679(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1015884(af854a3a-2127-422b-91ae-364da2661108)
http://www.blogcu.com/Liz0ziM/431845/(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24401(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24402(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24403(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24404(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24405(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24406(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24407(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24408(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24409(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24410(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24411(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24412(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24413(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24414(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24415(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24416(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24417(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24418(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24419(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24420(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24421(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24422(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24423(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24424(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24425(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24426(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24427(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24428(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/24429(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17434(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/1284(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.