CVE-2006-6691:Multiple PHP remote file inclusion vulnerabilities in Valdersoft Shopping Cart 3.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the commonIncludePath parameter to admin/include/common.php, include/common.php, or common_include/common.php.

splash
Back

Description Preview

This CVE describes multiple PHP remote file inclusion vulnerabilities in Valdersoft Shopping Cart 3.0 and earlier. An attacker can supply a URL in the commonIncludePath parameter, targeting one of three include scripts (admin/include/common.php, include/common.php, or common_include/common.php), which can lead to arbitrary PHP code execution on the server. Successful exploitation may result in full compromise of the affected application and potentially the underlying server.

Overview

Valdersoft Shopping Cart versions 3.0 and earlier are affected by several PHP remote file inclusion flaws that permit an attacker to cause the application to include and execute code from a remote URL via the commonIncludePath input used by critical include scripts. This class of vulnerability facilitates remote code execution, enabling attacker-controlled execution of PHP with the server’s privileges.

Remediation

  • Upgrade to a patched version or apply vendor-provided security updates that remove or fix the insecure commonIncludePath usage in the affected scripts (admin/include/common.php, include/common.php, common_include/common.php).
  • If upgrading is not possible, deploy mitigations:
    • Disable remote file inclusion in PHP by setting allow_url_include = Off and consider setting allow_url_fopen = Off where feasible.
    • Strengthen input validation and sanitization for the commonIncludePath parameter; ensure only local, whitelisted paths can be included and reject any URLs.
    • Refactor code to use strict, server-side path handling and avoid including user-supplied input; implement a safe include mechanism with a documented whitelist.
    • Enable a web application firewall (WAF) or IDS rules to detect and block suspicious include attempts via the commonIncludePath parameter.
  • Review server and application logs for anomalous include activity and apply follow-up patches as needed.

References

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Accommodation & Food Services: Low
    Accommodation & Food Services
  2. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  3. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  4. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  5. Construction: Low
    Construction
  6. Educational Services: Low
    Educational Services
  7. Finance and Insurance: Low
    Finance and Insurance
  8. Health Care & Social Assistance: Low
    Health Care & Social Assistance
  9. Information: Low
    Information
  10. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  11. Manufacturing: Low
    Manufacturing
  12. Mining: Low
    Mining
  13. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  14. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  15. Public Administration: Low
    Public Administration
  16. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  17. Retail Trade: Low
    Retail Trade
  18. Transportation & Warehousing: Low
    Transportation & Warehousing
  19. Utilities: Low
    Utilities
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background