CVE-2006-2685

Kevin Johnson Basic Analysis And Security Engine - Code Injection

Title source: rule

Description

PHP remote file inclusion vulnerability in Basic Analysis and Security Engine (BASE) 1.2.4 and earlier, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the BASE_path parameter to (1) base_qry_common.php, (2) base_stat_common.php, and (3) includes/base_include.inc.php.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/16897
exploitdb WORKING POC VERIFIED
by MC · rubywebappsphp
https://www.exploit-db.com/exploits/9908
exploitdb WORKING POC VERIFIED
by str0ke · textwebappsphp
https://www.exploit-db.com/exploits/1823
metasploit WORKING POC EXCELLENT
by MC · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/base_qry_common.rb

Scores

EPSS 0.8560
EPSS Percentile 99.4%

Details

CWE
CWE-94
Status published
Products (4)
kevin_johnson/basic_analysis_and_security_engine 1.2.0
kevin_johnson/basic_analysis_and_security_engine 1.2.1
kevin_johnson/basic_analysis_and_security_engine 1.2.2
kevin_johnson/basic_analysis_and_security_engine 1.2.4
Published May 31, 2006
Tracked Since Feb 18, 2026