The Languages selection in the admin interface in Kailash Nadh boastMachine (formerly bMachine) 3.1 and earlier allows remote authenticated administrators to upload files with arbitrary extensions to the bmc/Inc/Lang directory. NOTE: because the uploaded files cannot be accessed through HTTP, this issue is a vulnerability only if there is a likely usage pattern in which the files would be opened or executed by local users, e.g., malware files with names that entice local users to open the files.
References
Link | Resource |
---|---|
http://secunia.com/advisories/21066 | Vendor Advisory |
http://www.acid-root.new.fr/advisories/boastmachine.txt | Exploit |
http://secunia.com/advisories/21066 | Vendor Advisory |
http://www.acid-root.new.fr/advisories/boastmachine.txt | Exploit |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21066 - Vendor Advisory | |
References | () http://www.acid-root.new.fr/advisories/boastmachine.txt - Exploit |
Information
Published : 2006-07-25 13:22
Updated : 2024-11-21 00:14
NVD link : CVE-2006-3830
Mitre link : CVE-2006-3830
CVE.ORG link : CVE-2006-3830
JSON object : View
Products Affected
kailash_nadh
- boastmachine
CWE