Vulnerability Name: | CVE-2006-6690 (CCN-31061) | ||||||||
Assigned: | 2006-12-20 | ||||||||
Published: | 2006-12-20 | ||||||||
Updated: | 2018-10-17 | ||||||||
Summary: | rtehtmlarea/pi1/class.tx_rtehtmlarea_pi1.php in Typo3 4.0.0 through 4.0.3, 3.7 and 3.8 with the rtehtmlarea extension, and 4.1 beta allows remote authenticated users to execute arbitrary commands via shell metacharacters in the userUid parameter to rtehtmlarea/htmlarea/plugins/SpellChecker/spell-check-logic.php, and possibly another vector. his vulnerability is addressed in the following product release: Typo3, Typo3, 4.0.4 | ||||||||
CVSS v3 Severity: | 4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N/E:H/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Wed Dec 20 2006 - 07:04:15 CST SEC Consult SA-20061220-0 :: Typo3 Command Execution Vulnerability Source: MITRE Type: CNA CVE-2006-6690 Source: MLIST Type: Vendor Advisory [TYPO3-announce] 20061219 Pre-announcement for important security update Source: MLIST Type: Vendor Advisory [TYPO3-announce] 20061220 TYPO3 Security Bulletin TYPO3-20061220-1: Remote Command Execution in TYPO3 Source: CCN Type: SA23446 TYPO3 "userUid" Command Execution Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory 23446 Source: CCN Type: SA23466 TYPO3 rtehtmlarea Extension "userUid" Command Execution Source: SECUNIA Type: Patch, Vendor Advisory 23466 Source: SREASON Type: UNKNOWN 2056 Source: CCN Type: SECTRACK ID: 1017428 TYPO3 Input Validation Holes in `rtehtmlarea` Sysext Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Exploit, Patch 1017428 Source: CONFIRM Type: UNKNOWN http://typo3.org/news-single-view/?tx_newsimporter_pi1%5BshowItem%5D=0&cHash=e4a40a11a9 Source: CCN Type: OSVDB ID: 30890 TYPO3 (class.tx_rtehtmlarea_pi1.php) spell-check-logic.php userUid Arbitrary Command Execution Source: MISC Type: Exploit http://www.sec-consult.com/272.html Source: BUGTRAQ Type: UNKNOWN 20061220 SEC Consult SA-20061220-0 :: Typo3 Command Execution Vulnerability Source: BID Type: Exploit, Patch 21680 Source: CCN Type: BID-21680 Typo3 Class.TX_RTEHTMLArea_PI1.PHP Multiple Remote Command Execution Vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2006-5094 Source: XF Type: UNKNOWN typo3-useruid-command-execution(31061) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |