CVE-2006-3362

Unrestricted file upload vulnerability in connectors/php/connector.php in FCKeditor mcpuk file manager, as used in (1) Geeklog 1.4.0 through 1.4.0sr3, (2) toendaCMS 1.0.0 Shizouka Stable and earlier, (3) WeBid 0.5.4, and possibly other products, when installed on Apache with mod_mime, allows remote attackers to upload and execute arbitrary PHP code via a filename with a .php extension and a trailing extension that is allowed, such as .zip.
References
Link Resource
http://retrogod.altervista.org/toenda_100_shizouka_xpl.html Exploit
http://secunia.com/advisories/20886 Patch Vendor Advisory
http://secunia.com/advisories/21117 Vendor Advisory
http://www.geeklog.net/article.php/exploit-for-fckeditor-filemanager
http://www.geeklog.net/article.php/geeklog-1.4.0sr4
http://www.securityfocus.com/archive/1/440423/100/0/threaded
http://www.securityfocus.com/bid/18767 Exploit
http://www.securityfocus.com/bid/19072 Exploit
http://www.securityfocus.com/bid/30950
http://www.vupen.com/english/advisories/2006/2611
http://www.vupen.com/english/advisories/2006/2868
https://exchange.xforce.ibmcloud.com/vulnerabilities/27469
https://exchange.xforce.ibmcloud.com/vulnerabilities/27494
https://exchange.xforce.ibmcloud.com/vulnerabilities/27799
https://www.exploit-db.com/exploits/1964
https://www.exploit-db.com/exploits/2035
https://www.exploit-db.com/exploits/6344
http://retrogod.altervista.org/toenda_100_shizouka_xpl.html Exploit
http://secunia.com/advisories/20886 Patch Vendor Advisory
http://secunia.com/advisories/21117 Vendor Advisory
http://www.geeklog.net/article.php/exploit-for-fckeditor-filemanager
http://www.geeklog.net/article.php/geeklog-1.4.0sr4
http://www.securityfocus.com/archive/1/440423/100/0/threaded
http://www.securityfocus.com/bid/18767 Exploit
http://www.securityfocus.com/bid/19072 Exploit
http://www.securityfocus.com/bid/30950
http://www.vupen.com/english/advisories/2006/2611
http://www.vupen.com/english/advisories/2006/2868
https://exchange.xforce.ibmcloud.com/vulnerabilities/27469
https://exchange.xforce.ibmcloud.com/vulnerabilities/27494
https://exchange.xforce.ibmcloud.com/vulnerabilities/27799
https://www.exploit-db.com/exploits/1964
https://www.exploit-db.com/exploits/2035
https://www.exploit-db.com/exploits/6344
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:geeklog:geeklog:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:geeklog:geeklog:1.4.0_sr1:*:*:*:*:*:*:*
cpe:2.3:a:geeklog:geeklog:1.4.0_sr2:*:*:*:*:*:*:*
cpe:2.3:a:geeklog:geeklog:1.4.0_sr3:*:*:*:*:*:*:*
cpe:2.3:a:toenda_software_development:toendacms:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:toenda_software_development:toendacms:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:toenda_software_development:toendacms:0.7:*:*:*:*:*:*:*
cpe:2.3:a:toenda_software_development:toendacms:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:13

Type Values Removed Values Added
References () http://retrogod.altervista.org/toenda_100_shizouka_xpl.html - Exploit () http://retrogod.altervista.org/toenda_100_shizouka_xpl.html - Exploit
References () http://secunia.com/advisories/20886 - Patch, Vendor Advisory () http://secunia.com/advisories/20886 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21117 - Vendor Advisory () http://secunia.com/advisories/21117 - Vendor Advisory
References () http://www.geeklog.net/article.php/exploit-for-fckeditor-filemanager - () http://www.geeklog.net/article.php/exploit-for-fckeditor-filemanager -
References () http://www.geeklog.net/article.php/geeklog-1.4.0sr4 - () http://www.geeklog.net/article.php/geeklog-1.4.0sr4 -
References () http://www.securityfocus.com/archive/1/440423/100/0/threaded - () http://www.securityfocus.com/archive/1/440423/100/0/threaded -
References () http://www.securityfocus.com/bid/18767 - Exploit () http://www.securityfocus.com/bid/18767 - Exploit
References () http://www.securityfocus.com/bid/19072 - Exploit () http://www.securityfocus.com/bid/19072 - Exploit
References () http://www.securityfocus.com/bid/30950 - () http://www.securityfocus.com/bid/30950 -
References () http://www.vupen.com/english/advisories/2006/2611 - () http://www.vupen.com/english/advisories/2006/2611 -
References () http://www.vupen.com/english/advisories/2006/2868 - () http://www.vupen.com/english/advisories/2006/2868 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27469 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27469 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27494 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27494 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27799 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27799 -
References () https://www.exploit-db.com/exploits/1964 - () https://www.exploit-db.com/exploits/1964 -
References () https://www.exploit-db.com/exploits/2035 - () https://www.exploit-db.com/exploits/2035 -
References () https://www.exploit-db.com/exploits/6344 - () https://www.exploit-db.com/exploits/6344 -

Information

Published : 2006-07-06 20:05

Updated : 2024-11-21 00:13


NVD link : CVE-2006-3362

Mitre link : CVE-2006-3362

CVE.ORG link : CVE-2006-3362


JSON object : View

Products Affected

geeklog

  • geeklog

toenda_software_development

  • toendacms