{ "id": "CVE-2006-2530", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-22T23:10:00.000", "lastModified": "2018-10-18T16:40:33.867", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "avatar_upload.asp in Avatar MOD 1.3 for Snitz Forums 3.4, and possibly other versions, allows remote attackers to bypass file type checks and upload arbitrary files via a null byte in the file name, as discovered by the Codescan product." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-264" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:snitz_communications:avatar_mod:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E69FB7DC-8795-4E9D-B8CE-A94597B4D159" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:a:snitz_communications:snitz_forums_2000:3.4.02:*:*:*:*:*:*:*", "matchCriteriaId": "0D89B42F-7738-47EE-871A-FE16C53BCD81" }, { "vulnerable": false, "criteria": "cpe:2.3:a:snitz_communications:snitz_forums_2000:3.4.03:*:*:*:*:*:*:*", "matchCriteriaId": "FD4EF4E8-F8A9-40C4-9F89-8C64A8CF2625" }, { "vulnerable": false, "criteria": "cpe:2.3:a:snitz_communications:snitz_forums_2000:3.4.04:*:*:*:*:*:*:*", "matchCriteriaId": "A31D3D44-EC0B-4502-A1FA-3AE2BF4D4254" }, { "vulnerable": false, "criteria": "cpe:2.3:a:snitz_communications:snitz_forums_2000:3.4.05:*:*:*:*:*:*:*", "matchCriteriaId": "C6E3811E-DE0F-4AEB-A0C8-4115E9188A79" }, { "vulnerable": false, "criteria": "cpe:2.3:a:snitz_communications:snitz_forums_2000:3.4.06:*:*:*:*:*:*:*", "matchCriteriaId": "DF6A7A03-4580-4FB9-958E-992717F2AE72" }, { "vulnerable": false, "criteria": "cpe:2.3:a:snitz_communications:snitz_forums_2000:3.4.07:*:*:*:*:*:*:*", "matchCriteriaId": "5108B6BF-64D8-4F14-A237-E6A3F2538B7D" } ] } ] } ], "references": [ { "url": "http://www.codescan.com/Advisories/CodeScanLabs_AvatarMod.html", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.security-assessment.com/Whitepapers/0x00_vs_ASP_File_Uploads.pdf", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/434366/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/18014", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2006/1854", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26546", "source": "cve@mitre.org" } ] }