CVE-2006-3362
Published Jul 6, 2006
Last updated 6 years ago
Overview
- Description
- Unrestricted file upload vulnerability in connectors/php/connector.php in FCKeditor mcpuk file manager, as used in (1) Geeklog 1.4.0 through 1.4.0sr3, (2) toendaCMS 1.0.0 Shizouka Stable and earlier, (3) WeBid 0.5.4, and possibly other products, when installed on Apache with mod_mime, allows remote attackers to upload and execute arbitrary PHP code via a filename with a .php extension and a trailing extension that is allowed, such as .zip.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.1
- Impact score
- 6.4
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:geeklog:geeklog:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B89E7A29-0EAE-4BB0-B0DD-0B5B55F80453" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.4.0_sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA0DFD93-BA8A-49BE-9063-E40AC757708A" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.4.0_sr2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E07EB8A-5B67-41B9-8358-1CE59E1B6E09" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.4.0_sr3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3EAF15E-44B6-44F6-B794-2DF571131415" }, { "criteria": "cpe:2.3:a:toenda_software_development:toendacms:0.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB6C4C75-D481-4B53-B94B-C92B8EFCC4F2" }, { "criteria": "cpe:2.3:a:toenda_software_development:toendacms:0.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95B16BFA-7796-45FF-813B-987B5F9BB635" }, { "criteria": "cpe:2.3:a:toenda_software_development:toendacms:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DEB50B9-4BF5-4815-87F4-67C868979805" }, { "criteria": "cpe:2.3:a:toenda_software_development:toendacms:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E3A79A9-C696-4B6F-92C3-9ED496D636FE" } ], "operator": "OR" } ] } ]