avatar_upload.asp in Avatar MOD 1.3 for Snitz Forums 3.4, and possibly other versions, allows remote attackers to bypass file type checks and upload arbitrary files via a null byte in the file name, as discovered by the Codescan product.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20148 - Patch, Vendor Advisory | |
References | () http://www.codescan.com/Advisories/CodeScanLabs_AvatarMod.html - Exploit | |
References | () http://www.security-assessment.com/Whitepapers/0x00_vs_ASP_File_Uploads.pdf - | |
References | () http://www.securityfocus.com/archive/1/434366/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18014 - | |
References | () http://www.vupen.com/english/advisories/2006/1854 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26546 - |
Information
Published : 2006-05-22 23:10
Updated : 2024-11-21 00:11
NVD link : CVE-2006-2530
Mitre link : CVE-2006-2530
CVE.ORG link : CVE-2006-2530
JSON object : View
Products Affected
snitz_communications
- snitz_forums_2000
- avatar_mod
CWE
CWE-264
Permissions, Privileges, and Access Controls