PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: it has been reported that 4.1 versions might also be affected.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/22133 - Vendor Advisory | |
References | () http://secunia.com/advisories/22134 - Vendor Advisory | |
References | () http://secunia.com/advisories/22135 - Vendor Advisory | |
References | () http://secunia.com/advisories/22147 - Vendor Advisory | |
References | () http://secunia.com/advisories/22149 - Vendor Advisory | |
References | () http://secunia.com/advisories/22151 - Vendor Advisory | |
References | () http://secunia.com/advisories/22153 - Vendor Advisory | |
References | () http://secunia.com/advisories/22154 - Vendor Advisory | |
References | () http://secunia.com/advisories/22157 - Vendor Advisory | |
References | () http://secunia.com/advisories/22168 - Vendor Advisory | |
References | () http://secunia.com/advisories/22169 - Vendor Advisory | |
References | () http://secunia.com/advisories/22170 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1658 - | |
References | () http://www.osvdb.org/29299 - | |
References | () http://www.osvdb.org/29300 - | |
References | () http://www.osvdb.org/29301 - | |
References | () http://www.osvdb.org/29302 - | |
References | () http://www.osvdb.org/29303 - | |
References | () http://www.osvdb.org/29304 - | |
References | () http://www.osvdb.org/29305 - | |
References | () http://www.osvdb.org/29306 - | |
References | () http://www.osvdb.org/29307 - | |
References | () http://www.osvdb.org/29308 - | |
References | () http://www.osvdb.org/29309 - | |
References | () http://www.osvdb.org/29310 - | |
References | () http://www.osvdb.org/29311 - | |
References | () http://www.securityfocus.com/archive/1/447184/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447185/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447186/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447187/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447188/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447190/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447192/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447193/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447194/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447201/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447207/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447209/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/447213/100/0/threaded - | |
References | () http://www.vupen.com/english/advisories/2006/3803 - | |
References | () http://www.vupen.com/english/advisories/2006/3804 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3805 - | |
References | () http://www.vupen.com/english/advisories/2006/3806 - | |
References | () http://www.vupen.com/english/advisories/2006/3807 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3808 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3809 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3810 - | |
References | () http://www.vupen.com/english/advisories/2006/3811 - | |
References | () http://www.vupen.com/english/advisories/2006/3812 - | |
References | () http://www.vupen.com/english/advisories/2006/3813 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3814 - | |
References | () http://www.vupen.com/english/advisories/2006/3815 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29220 - |
Information
Published : 2006-10-03 04:03
Updated : 2024-11-21 00:17
NVD link : CVE-2006-5101
Mitre link : CVE-2006-5101
CVE.ORG link : CVE-2006-5101
JSON object : View
Products Affected
comdev
- comdev_csv_importer
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')