CVE-2006-1688

Public Exploit

Description

Multiple PHP remote file inclusion vulnerabilities in SQuery 4.5 and earlier, as used in products such as Autonomous LAN party (ALP), allow remote attackers to execute arbitrary PHP code via a URL in the libpath parameter to scripts in the lib directory including (1) ase.php, (2) devi.php, (3) doom3.php, (4) et.php, (5) flashpoint.php, (6) gameSpy.php, (7) gameSpy2.php, (8) gore.php, (9) gsvari.php, (10) halo.php, (11) hlife.php, (12) hlife2.php, (13) igi2.php, (14) main.lib.php, (15) netpanzer.php, (16) old_hlife.php, (17) pkill.php, (18) q2a.php, (19) q3a.php, (20) qworld.php, (21) rene.php, (22) rvbshld.php, (23) savage.php, (24) simracer.php, (25) sof1.php, (26) sof2.php, (27) unreal.php, (28) ut2004.php, and (29) vietcong.php. NOTE: the lib/armygame.php vector is already covered by CVE-2006-1610. The provenance of most of these additional vectors is unknown, although likely from post-disclosure analysis. NOTE: this only occurs when register_globals is disabled.

Category

7.5
CVSS
Severity: High
CVSS 2.0 •
EPSS 3.51% Top 15%
Vendor Advisory secunia.com Vendor Advisory secunia.com Vendor Advisory vupen.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.osvdb.org/24402 vdb entry
http://www.blogcu.com/Liz0ziM/431845/ exploit url repurposed
http://www.osvdb.org/24404 vdb entry
http://www.osvdb.org/24411 vdb entry
http://www.vupen.com/english/advisories/2006/1284 vdb entry vendor advisory
http://www.osvdb.org/24403 vdb entry
http://www.osvdb.org/24421 vdb entry
http://www.osvdb.org/24428 vdb entry
http://www.osvdb.org/24407 vdb entry exploit
http://www.osvdb.org/24414 vdb entry
http://www.osvdb.org/24424 vdb entry
http://www.osvdb.org/24425 vdb entry
http://www.osvdb.org/24410 vdb entry
http://www.osvdb.org/24413 vdb entry
http://www.securityfocus.com/bid/17434 vdb entry exploit
http://www.osvdb.org/24412 vdb entry
http://www.osvdb.org/24406 vdb entry
http://securityreason.com/securityalert/679 third party advisory
http://www.osvdb.org/24409 vdb entry
http://secunia.com/advisories/19588 third party advisory vendor advisory
http://www.osvdb.org/24423 vdb entry
http://www.osvdb.org/24416 vdb entry
http://www.osvdb.org/24408 vdb entry
http://www.osvdb.org/24405 vdb entry
http://www.osvdb.org/24427 vdb entry
http://www.securityfocus.com/archive/1/439874/100/0/threaded mailing list
http://www.securityfocus.com/archive/1/430289/100/0/threaded mailing list
http://www.osvdb.org/24418 vdb entry
http://secunia.com/advisories/19482 third party advisory vendor advisory
http://www.securityfocus.com/archive/1/441015/100/0/threaded mailing list
http://www.osvdb.org/24426 vdb entry
http://www.osvdb.org/24401 vdb entry
http://www.osvdb.org/24429 vdb entry
http://www.osvdb.org/24422 vdb entry
http://www.osvdb.org/24420 vdb entry
http://liz0zim.no-ip.org/alp.txt exploit
http://www.osvdb.org/24419 vdb entry
http://securitytracker.com/id?1015884 vdb entry exploit
http://www.osvdb.org/24417 vdb entry
http://www.osvdb.org/24415 vdb entry

Frequently Asked Questions

What is the severity of CVE-2006-1688?
CVE-2006-1688 has been scored as a high severity vulnerability.
How to fix CVE-2006-1688?
To fix CVE-2006-1688, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2006-1688 being actively exploited in the wild?
It is possible that CVE-2006-1688 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~4% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.