Vulnerability Name:

CVE-2006-3695 (CCN-27706)

Assigned:2006-07-06
Published:2006-07-06
Updated:2017-07-20
Summary:Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors.
Note: this might be related to CVE-2006-3458.
Upgrade to 0.9.6
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2006-3695

Source: CCN
Type: Trac Announce Mailing List, Thu Jul 6 13:30:26 CDT 2006
SECURITY: Trac 0.9.6 Released

Source: CCN
Type: Trac Web site
The Trac Project - Trac

Source: CCN
Type: SA20958
Trac "reStructuredText" Directives Vulnerability

Source: SECUNIA
Type: Vendor Advisory
20958

Source: SECUNIA
Type: Vendor Advisory
21534

Source: CCN
Type: SECTRACK ID: 1016457
Trac Lets Remote Users Obtain Information and Deny Service

Source: SECTRACK
Type: UNKNOWN
1016457

Source: CONFIRM
Type: UNKNOWN
http://trac.edgewall.org/wiki/ChangeLog

Source: DEBIAN
Type: UNKNOWN
DSA-1152

Source: DEBIAN
Type: DSA-1152
trac -- missing input sanitising

Source: BID
Type: UNKNOWN
18323

Source: CCN
Type: BID-18323
Trac Information Disclosure And Denial of Service Vulnerabilities

Source: VUPEN
Type: Vendor Advisory
ADV-2006-2729

Source: XF
Type: UNKNOWN
trac-restructuredtext-info-disclosure(27706)

Source: XF
Type: UNKNOWN
trac-restructuredtext-obtain-information(27706)

Source: XF
Type: UNKNOWN
trac-restructuredtext-dos(27708)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:edgewall_software:trac:*:*:*:*:*:*:*:* (Version <= 0.9.5)

  • Configuration CCN 1:
  • cpe:/a:edgewall:trac:0.9.5:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2006-3695 (CCN-27708)

    Assigned:2006-07-06
    Published:2006-07-06
    Updated:2017-07-20
    Summary:Upgrade to 0.9.6
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
    5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Type:CWE-Other
    Vulnerability Consequences:Denial of Service
    References:Source: MITRE
    Type: CNA
    CVE-2006-3695

    Source: CCN
    Type: Trac Announce Mailing List, Thu Jul 6 13:30:26 CDT 2006
    SECURITY: Trac 0.9.6 Released

    Source: CCN
    Type: Trac Web site
    The Trac Project - Trac

    Source: CCN
    Type: SA20958
    Trac "reStructuredText" Directives Vulnerability

    Source: CCN
    Type: SECTRACK ID: 1016457
    Trac Lets Remote Users Obtain Information and Deny Service

    Source: DEBIAN
    Type: DSA-1152
    trac -- missing input sanitising

    Source: CCN
    Type: BID-18323
    Trac Information Disclosure And Denial of Service Vulnerabilities

    Source: XF
    Type: UNKNOWN
    trac-restructuredtext-dos(27708)

    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:1152
    V
    missing input sanitising
    2006-08-18
    BACK
    edgewall_software trac *
    edgewall trac 0.9.5
    debian debian linux 3.1