Vulnerability Details : CVE-2006-3850
PHP remote file inclusion vulnerability in upgrader.php in Vanilla CMS 1.0.1 and earlier, when /conf/old_settings.php exists, allows remote attackers to execute arbitrary PHP code via a URL in the RootDirectory parameter. NOTE: this issue has been disputed by a third party who states that the RootDirectory parameter is initialized before being used, for version 1.0. CVE analysis concurs with the dispute, but it is unclear whether older versions are affected
Vulnerability category: File inclusion
Products affected by CVE-2006-3850
- cpe:2.3:a:lussumo:vanilla:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-3850
40.97%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-3850
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2006-3850
-
http://www.osvdb.org/28287
404 Not Found
-
http://www.securityfocus.com/archive/1/440938/100/0/threaded
-
http://www.securityfocus.com/bid/19127
Exploit
-
http://www.attrition.org/pipermail/vim/2006-July/000944.html
[VIM] Vanilla CMS
-
http://www.attrition.org/pipermail/vim/2006-July/000937.html
[VIM] Vanilla CMS
-
http://www.securityfocus.com/archive/1/442450/100/0/threaded
-
http://securitytracker.com/id?1016568
securitytracker.com
-
http://securityreason.com/securityalert/1281
Vanilla CMS <= 1.0.1 (RootDirectory) Remote file inclusion Vuln. - CXSecurity.com
Jump to