CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2006-5101

PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: it has been reported that 4.1 versions might also be affected.
Publish Date : 2006-10-03 Last Update Date : 2011-08-22
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
7.5
Confidentiality Impact Partial (There is considerable informational disclosure.)
Integrity Impact Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact Partial (There is reduced performance or interruptions in resource availability.)
Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access User
Vulnerability Type(s) Execute CodeFile Inclusion
CWE ID 94

- Products Affected By CVE-2006-5101

# Product Type Vendor Product Version Update Edition Language
1 Application Comdev Comdev Csv Importer 3.1 Version Details Vulnerabilities
2 Application Comdev Comdev Csv Importer 4.1 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Comdev Comdev Csv Importer 2

- References For CVE-2006-5101

http://secunia.com/advisories/22134
SECUNIA 22134
http://secunia.com/advisories/22133
SECUNIA 22133
http://secunia.com/advisories/22135
SECUNIA 22135
http://secunia.com/advisories/22147
SECUNIA 22147
http://secunia.com/advisories/22149
SECUNIA 22149
http://secunia.com/advisories/22151
SECUNIA 22151
http://secunia.com/advisories/22153
SECUNIA 22153
http://secunia.com/advisories/22154
SECUNIA 22154
http://secunia.com/advisories/22169
SECUNIA 22169
http://secunia.com/advisories/22168
SECUNIA 22168
http://secunia.com/advisories/22157
SECUNIA 22157
http://securityreason.com/securityalert/1658
SREASON 1658
http://secunia.com/advisories/22170
SECUNIA 22170
http://www.osvdb.org/29299
OSVDB 29299
http://www.osvdb.org/29300
OSVDB 29300
http://www.osvdb.org/29301
OSVDB 29301
http://www.osvdb.org/29302
OSVDB 29302
http://www.osvdb.org/29303
OSVDB 29303
http://www.osvdb.org/29304
OSVDB 29304
http://www.osvdb.org/29305
OSVDB 29305
http://www.osvdb.org/29306
OSVDB 29306
http://www.osvdb.org/29307
OSVDB 29307
http://www.osvdb.org/29308
OSVDB 29308
http://www.osvdb.org/29309
OSVDB 29309
http://www.osvdb.org/29311
OSVDB 29311
http://www.osvdb.org/29310
OSVDB 29310
http://www.securityfocus.com/archive/1/archive/1/447184/100/0/threaded
BUGTRAQ 20060927 Comdev CSV Importer 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447185/100/0/threaded
BUGTRAQ 20060927 Comdev Links Directory 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447186/100/0/threaded
BUGTRAQ 20060927 Comdev Vote Caster 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447187/100/0/threaded
BUGTRAQ 20060927 Comdev Photo Gallery 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447188/100/0/threaded
BUGTRAQ 20060927 Comdev Customer Helpdesk 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447190/100/0/threaded
BUGTRAQ 20060927 Comdev News Publisher 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447192/100/0/threaded
BUGTRAQ 20060927 Comdev Contact Form 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447193/100/0/threaded
BUGTRAQ 20060927 Comdev Web Blogger 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447207/100/0/threaded
BUGTRAQ 20060927 Comdev Guestbook 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447201/100/0/threaded
BUGTRAQ 20060927 Comdev FAQ Support 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447194/100/0/threaded
BUGTRAQ 20060927 Comdev eCommerce 3.1 :) <= Remote File Inclusion
http://www.securityfocus.com/archive/1/archive/1/447209/100/0/threaded
BUGTRAQ 20060927 Comdev Newsletter 3.1 :) <= Remote File Inclusion
http://www.vupen.com/english/advisories/2006/3814
VUPEN ADV-2006-3814
http://www.vupen.com/english/advisories/2006/3813
VUPEN ADV-2006-3813
http://www.securityfocus.com/archive/1/archive/1/447213/100/0/threaded
BUGTRAQ 20060927 Comdev Events Calendar 3.1 :) <= Remote File Inclusion
http://www.vupen.com/english/advisories/2006/3810
VUPEN ADV-2006-3810
http://www.vupen.com/english/advisories/2006/3809
VUPEN ADV-2006-3809
http://www.vupen.com/english/advisories/2006/3808
VUPEN ADV-2006-3808
http://www.vupen.com/english/advisories/2006/3807
VUPEN ADV-2006-3807
http://www.vupen.com/english/advisories/2006/3806
VUPEN ADV-2006-3806
http://www.vupen.com/english/advisories/2006/3805
VUPEN ADV-2006-3805
http://www.vupen.com/english/advisories/2006/3804
VUPEN ADV-2006-3804
http://www.vupen.com/english/advisories/2006/3803
VUPEN ADV-2006-3803
http://www.vupen.com/english/advisories/2006/3812
VUPEN ADV-2006-3812
http://www.vupen.com/english/advisories/2006/3811
VUPEN ADV-2006-3811
http://xforce.iss.net/xforce/xfdb/29220
XF comdev-include-file-include(29220)
http://www.vupen.com/english/advisories/2006/3815
VUPEN ADV-2006-3815

- Metasploit Modules Related To CVE-2006-5101

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.