CVE-2006-6690

rtehtmlarea/pi1/class.tx_rtehtmlarea_pi1.php in Typo3 4.0.0 through 4.0.3, 3.7 and 3.8 with the rtehtmlarea extension, and 4.1 beta allows remote authenticated users to execute arbitrary commands via shell metacharacters in the userUid parameter to rtehtmlarea/htmlarea/plugins/SpellChecker/spell-check-logic.php, and possibly another vector.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:typo3:typo3:3.7.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:3.8:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.0.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:23

Type Values Removed Values Added
References () http://lists.netfielders.de/pipermail/typo3-announce/2006/000045.html - Vendor Advisory () http://lists.netfielders.de/pipermail/typo3-announce/2006/000045.html - Vendor Advisory
References () http://lists.netfielders.de/pipermail/typo3-announce/2006/000046.html - Vendor Advisory () http://lists.netfielders.de/pipermail/typo3-announce/2006/000046.html - Vendor Advisory
References () http://secunia.com/advisories/23446 - Patch, Vendor Advisory () http://secunia.com/advisories/23446 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23466 - Patch, Vendor Advisory () http://secunia.com/advisories/23466 - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/2056 - () http://securityreason.com/securityalert/2056 -
References () http://securitytracker.com/id?1017428 - Exploit, Patch () http://securitytracker.com/id?1017428 - Exploit, Patch
References () http://typo3.org/news-single-view/?tx_newsimporter_pi1%5BshowItem%5D=0&cHash=e4a40a11a9 - () http://typo3.org/news-single-view/?tx_newsimporter_pi1%5BshowItem%5D=0&cHash=e4a40a11a9 -
References () http://www.sec-consult.com/272.html - Exploit () http://www.sec-consult.com/272.html - Exploit
References () http://www.securityfocus.com/archive/1/454944/100/0/threaded - () http://www.securityfocus.com/archive/1/454944/100/0/threaded -
References () http://www.securityfocus.com/bid/21680 - Exploit, Patch () http://www.securityfocus.com/bid/21680 - Exploit, Patch
References () http://www.vupen.com/english/advisories/2006/5094 - () http://www.vupen.com/english/advisories/2006/5094 -

Information

Published : 2006-12-21 21:28

Updated : 2024-11-21 00:23


NVD link : CVE-2006-6690

Mitre link : CVE-2006-6690

CVE.ORG link : CVE-2006-6690


JSON object : View

Products Affected

typo3

  • typo3