add.asp in DUware DUbanner 3.1 allows remote attackers to execute arbitrary code by uploading files with arbitrary extensions, such as ASP files, probably due to client-side enforcement that can be bypassed.  NOTE: some of these details are obtained from third party information, since the raw source is vague.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/advisories/20102 | Broken Link Vendor Advisory | 
| http://securityreason.com/securityalert/911 | Third Party Advisory | 
| http://www.securityfocus.com/archive/1/433894/100/0/threaded | Broken Link Third Party Advisory VDB Entry | 
| http://www.securityfocus.com/bid/17993 | Broken Link VDB Entry | 
| http://www.vupen.com/english/advisories/2006/1825 | Broken Link | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/26457 | Third Party Advisory VDB Entry | 
| http://secunia.com/advisories/20102 | Broken Link Vendor Advisory | 
| http://securityreason.com/securityalert/911 | Third Party Advisory | 
| http://www.securityfocus.com/archive/1/433894/100/0/threaded | Broken Link Third Party Advisory VDB Entry | 
| http://www.securityfocus.com/bid/17993 | Broken Link VDB Entry | 
| http://www.vupen.com/english/advisories/2006/1825 | Broken Link | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/26457 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    21 Nov 2024, 00:11
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/20102 - Broken Link, Vendor Advisory | |
| References | () http://securityreason.com/securityalert/911 - Third Party Advisory | |
| References | () http://www.securityfocus.com/archive/1/433894/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.securityfocus.com/bid/17993 - Broken Link, VDB Entry | |
| References | () http://www.vupen.com/english/advisories/2006/1825 - Broken Link | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26457 - Third Party Advisory, VDB Entry | 
26 Jan 2024, 19:01
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 7.5 v3 : unknown | 
| CWE | CWE-434 | |
| CPE | cpe:2.3:a:duware_dubanner_project:duware_dubanner:3.1:*:*:*:*:*:*:* | |
| References | (BID) http://www.securityfocus.com/bid/17993 - Broken Link, VDB Entry | |
| References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/26457 - Third Party Advisory, VDB Entry | |
| References | (SECUNIA) http://secunia.com/advisories/20102 - Broken Link, Vendor Advisory | |
| References | (SREASON) http://securityreason.com/securityalert/911 - Third Party Advisory | |
| References | (VUPEN) http://www.vupen.com/english/advisories/2006/1825 - Broken Link | |
| References | (BUGTRAQ) http://www.securityfocus.com/archive/1/433894/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | 
Information
                Published : 2006-05-17 10:06
Updated : 2025-04-03 01:03
NVD link : CVE-2006-2428
Mitre link : CVE-2006-2428
CVE.ORG link : CVE-2006-2428
JSON object : View
Products Affected
                duware_dubanner_project
- duware_dubanner
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
