CVE-2006-6511

dadaIMC .99.3 uses an insufficiently restrictive FilesMatch directive in the installed .htaccess file, which allows remote attackers to execute arbitrary PHP code by uploading files whose names contain (1) feature, (2) editor, (3) newswire, (4) otherpress, (5) admin, (6) pbook, (7) media, or (8) mod, which are processed as PHP file types (application/x-httpd-php).
Configurations

Configuration 1 (hide)

cpe:2.3:a:dadaimc:dadaimc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://bugs.dadaimc.org/view.php?id=191 - () http://bugs.dadaimc.org/view.php?id=191 -
References () http://secunia.com/advisories/23305 - Vendor Advisory () http://secunia.com/advisories/23305 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/4977 - () http://www.vupen.com/english/advisories/2006/4977 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30862 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30862 -

Information

Published : 2006-12-14 00:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6511

Mitre link : CVE-2006-6511

CVE.ORG link : CVE-2006-6511


JSON object : View

Products Affected

dadaimc

  • dadaimc