Indexcor ezDatabase 2.0/2.1.2 visitorupload.php include db_id Remote Code Execution
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.6 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Indexcor ezDatabase 2.0/2.1.2. It has been rated as critical. Affected by this issue is the function include of the file visitorupload.php. This manipulation of the argument db_id causes Remote Code Execution.
This vulnerability is registered as CVE-2006-0214. Furthermore, an exploit is available.
Details
A vulnerability classified as critical was found in Indexcor ezDatabase 2.0/2.1.2. Affected by this vulnerability is the function include of the file visitorupload.php. The manipulation of the argument db_id with an unknown input leads to a remote code execution vulnerability. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
Eval injection vulnerability in ezDatabase 2.0 and earlier allows remote attackers to execute arbitrary PHP code via the db_id parameter to visitorupload.php, as demonstrated using phpinfo and include function calls.
The weakness was published 01/14/2006 (Website). It is possible to read the advisory at securityfocus.com. This vulnerability is known as CVE-2006-0214 since 01/15/2006. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details and also a public exploit are known.
After before and not just, there has been an exploit disclosed. It is possible to download the exploit at cijfer.hua.fi. It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 1 days. During that time the estimated underground price was around $0-$5k. By approaching the search of inurl:visitorupload.php it is possible to find vulnerable targets with Google Hacking.
The vulnerability is also documented in the databases at X-Force (24136), Exploit-DB (1442), SecurityFocus (BID 16237†), OSVDB (22683†) and Secunia (SA18043†). Similar entries are available at VDB-28399, VDB-27553, VDB-27552 and VDB-27551. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 6.6
VulDB Base Score: 7.3
VulDB Temp Score: 6.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
12/16/2005 🔍01/14/2006 🔍
01/14/2006 🔍
01/14/2006 🔍
01/15/2006 🔍
01/15/2006 🔍
01/20/2006 🔍
03/12/2015 🔍
10/18/2025 🔍
Sources
Advisory: securityfocus.com⛔Status: Confirmed
CVE: CVE-2006-0214 (🔍)
GCVE (CVE): GCVE-0-2006-0214
GCVE (VulDB): GCVE-100-28315
X-Force: 24136 - ezDatabase visitorupload.php file include
SecurityFocus: 16237 - EZDatabaseRemote PHP Script Code Execution Vulnerability
Secunia: 18043 - ezDatabase "p" Local File Inclusion and "db_id" Code Execution, Highly Critical
OSVDB: 22683 - ezDatabase visitorupload.php db_id Variable Arbitrary PHP Command Execution
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 03/12/2015 11:11Updated: 10/18/2025 18:28
Changes: 03/12/2015 11:11 (57), 07/17/2018 10:19 (10), 10/18/2025 18:28 (21)
Complete: 🔍
Cache ID: 216:F06:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.