CVE-2006-2842

NUCLEI

SquirrelMail <1.4.6 - RCE

Title source: llm

Description

PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable

Exploits (2)

exploitdb WORKING POC VERIFIED
by brokejunker · textwebappsphp
https://www.exploit-db.com/exploits/27948
nomisec SCANNER 3 stars
by karthi-the-hacker · poc
https://github.com/karthi-the-hacker/CVE-2006-2842

Nuclei Templates (1)

Squirrelmail <=1.4.6 - Local File Inclusion
HIGHby dhiyaneshDk
Shodan: http.title:"squirrelmail" || cpe:"cpe:2.3:a:squirrelmail:squirrelmail"
FOFA: title="squirrelmail"

References (20)

Scores

EPSS 0.0094
EPSS Percentile 76.3%

Details

Status published
Products (27)
squirrelmail/squirrelmail 1.0.4
squirrelmail/squirrelmail 1.0.5
squirrelmail/squirrelmail 1.2.0
squirrelmail/squirrelmail 1.2.1
squirrelmail/squirrelmail 1.2.2
squirrelmail/squirrelmail 1.2.3
squirrelmail/squirrelmail 1.2.4
squirrelmail/squirrelmail 1.2.5
squirrelmail/squirrelmail 1.2.6
squirrelmail/squirrelmail 1.2.7
... and 17 more
Published Jun 06, 2006
Tracked Since Feb 18, 2026