Vulnerability Name: | CVE-2006-0044 (CCN-24130) | ||||||||
Assigned: | 2005-12-28 | ||||||||
Published: | 2006-01-16 | ||||||||
Updated: | 2017-07-20 | ||||||||
Summary: | Unspecified vulnerability in context.py in Albatross web application toolkit before 1.33 allows remote attackers to execute arbitrary commands via unspecified vectors involving template files and the "handling of submitted form fields". | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2006-0044 Source: CCN Type: SA18457 Albatross Arbitrary Command Execution Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory 18457 Source: SECUNIA Type: UNKNOWN 18496 Source: MISC Type: UNKNOWN http://security.debian.org/pool/updates/main/a/albatross/albatross_1.20-2.diff.gz Source: DEBIAN Type: Patch, Vendor Advisory DSA-942 Source: DEBIAN Type: DSA-942 albatross -- design error Source: CCN Type: Object Craft Web site Albatross - a Toolkit for Stateful Web Applications Source: CONFIRM Type: UNKNOWN http://www.object-craft.com.au/projects/albatross/news.html Source: OSVDB Type: UNKNOWN 22451 Source: CCN Type: OSVDB ID: 22451 Albatross Template Manipulation Arbitrary Command Execution Source: BID Type: UNKNOWN 16252 Source: CCN Type: BID-16252 Albatross Remote Arbitrary Code Execution Vulnerability Source: VUPEN Type: UNKNOWN ADV-2006-0196 Source: XF Type: UNKNOWN albatross-context-command-execution(24130) Source: XF Type: UNKNOWN albatross-context-command-execution(24130) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |