Vulnerability Details : CVE-2006-3210
Ralf Image Gallery (RIG) 0.7.4 and other versions before 1.0, when register_globals is enabled, allows remote attackers to conduct PHP remote file inclusion and directory traversal attacks via URLs or ".." sequences in the (1) dir_abs_src parameter in (a) check_entry.php, (b) admin_album.php, (c) admin_image.php, and (d) admin_util.php; and the (2) dir_abs_admin_src parameter in admin_album.php and admin_image.php. NOTE: this issue can be leveraged to conduct cross-site scripting (XSS) attacks.
Vulnerability category: Cross site scripting (XSS)Directory traversalFile inclusion
Exploit prediction scoring system (EPSS) score for CVE-2006-3210
Probability of exploitation activity in the next 30 days: 23.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3210
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
nvd@nist.gov |
CWE ids for CVE-2006-3210
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-3210
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27256
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27259
-
http://www.securityfocus.com/archive/1/438645/100/100/threaded
-
http://rig.powerpulsar.com/#news
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27257
-
http://www.securityfocus.com/bid/18548
-
http://securityreason.com/securityalert/1136
-
http://www.majorsecurity.de/advisory/major_rls18.txt
-
http://www.vupen.com/english/advisories/2006/2477
Vendor Advisory
-
http://www.securityfocus.com/archive/1/437818/100/0/threaded
Products affected by CVE-2006-3210
- cpe:2.3:a:le_ralf:ralf_image_gallery:0.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:le_ralf:ralf_image_gallery:0.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:le_ralf:ralf_image_gallery:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:le_ralf:ralf_image_gallery:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:le_ralf:ralf_image_gallery:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:le_ralf:ralf_image_gallery:0.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:le_ralf:ralf_image_gallery:0.6.5:*:*:*:*:*:*:*