mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
97 lines
3.4 KiB
JSON
97 lines
3.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-3850",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "** DISPUTED ** PHP remote file inclusion vulnerability in upgrader.php in Vanilla CMS 1.0.1 and earlier, when /conf/old_settings.php exists, allows remote attackers to execute arbitrary PHP code via a URL in the RootDirectory parameter. NOTE: this issue has been disputed by a third party who states that the RootDirectory parameter is initialized before being used, for version 1.0. CVE analysis concurs with the dispute, but it is unclear whether older versions are affected."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "20060723 Vanilla CMS <= 1.0.1 (RootDirectory) Remote file inclusion Vuln.",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/440938/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "20060724 Vanilla CMS",
|
|
"refsource": "VIM",
|
|
"url": "http://www.attrition.org/pipermail/vim/2006-July/000937.html"
|
|
},
|
|
{
|
|
"name": "20060725 Vanilla CMS",
|
|
"refsource": "VIM",
|
|
"url": "http://www.attrition.org/pipermail/vim/2006-July/000944.html"
|
|
},
|
|
{
|
|
"name": "20060805 Re: Vanilla CMS <= 1.0.1 (RootDirectory) Remote file inclusion Vuln.",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/442450/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "1016568",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1016568"
|
|
},
|
|
{
|
|
"name": "19127",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/19127"
|
|
},
|
|
{
|
|
"name": "28287",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/28287"
|
|
},
|
|
{
|
|
"name": "1281",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/1281"
|
|
}
|
|
]
|
|
}
|
|
} |