Vulnerability Details : CVE-2006-2330
PHP-Fusion 6.00.306 and earlier, running under Apache HTTP Server 1.3.27 and PHP 4.3.3, allows remote authenticated users to upload files of arbitrary types using a filename that contains two or more extensions that ends in an assumed-valid extension such as .gif, which bypasses the validation, as demonstrated by uploading then executing an avatar file that ends in ".php.gif" and contains PHP code in EXIF metadata.
Exploit prediction scoring system (EPSS) score for CVE-2006-2330
Probability of exploitation activity in the next 30 days: 0.48%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-2330
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST |
References for CVE-2006-2330
Products affected by CVE-2006-2330
- cpe:2.3:a:php_fusion:php_fusion:6.00.109:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.00.106:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.00.107:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.00.105:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.00.204:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.00.206:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.00.110:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.00.303:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.00.3:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.00.304:*:*:*:*:*:*:*
- cpe:2.3:a:php_fusion:php_fusion:6.00.306:*:*:*:*:*:*:*