Vulnerability Details : CVE-2006-3070
write_ok.php in Zeroboard 4.1 pl8, when installed on Apache with mod_mime, allows remote attackers to bypass restrictions for uploading files with executable extensions by uploading a .htaccess file that with an AddType directive that assigns an executable module to files with assumed-safe extensions, as demonstrated by assigning the txt extension to be handled by application/x-httpd-php.
Exploit prediction scoring system (EPSS) score for CVE-2006-3070
Probability of exploitation activity in the next 30 days: 57.46%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3070
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-3070
-
http://www.vupen.com/english/advisories/2006/2318
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27038
-
http://www.securityfocus.com/archive/1/437442/30/4320/threaded
-
http://www.securityfocus.com/bid/18465
-
http://securecast.wins21.com/zerovul.html
Exploit;Patch;Vendor Advisory
-
http://marc.info/?l=full-disclosure&m=115044567831726&w=2
Products affected by CVE-2006-3070
- cpe:2.3:a:zeroboard:zeroboard:4.1_pl8:*:*:*:*:*:*:*