Vulnerability Description
CRE Loaded 6.15 allows remote attackers to perform privileged actions, including uploading and creating arbitrary files, via a direct request to files.php. NOTE: the vendor states "The initial announcement of this risk was made on our website... and it included a patch which will close the vulnerability on all known 6.0x and 6.1x releases. We strongly encourage users of CRE Loaded 6.x, osCMax, and other users of osCommerce who have installed HTMLArea based WYSIWYG editors and Admin Access with Levels to modify thier installations at the earliest possible moment."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cre Loaded | Cre Loaded | 6.15 |
References
- http://secunia.com/advisories/18648PatchVendor Advisory
- http://www.attrition.org/pipermail/vim/2006-February/000527.html
- http://www.osvdb.org/22793
- http://www.securityfocus.com/bid/16415Patch
- http://www.vupen.com/english/advisories/2006/0373
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24377
- http://secunia.com/advisories/18648PatchVendor Advisory
- http://www.attrition.org/pipermail/vim/2006-February/000527.html
- http://www.osvdb.org/22793
- http://www.securityfocus.com/bid/16415Patch
- http://www.vupen.com/english/advisories/2006/0373
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24377
FAQ
What is CVE-2006-0478?
CVE-2006-0478 is a vulnerability with a CVSS score of 7.5 (HIGH). CRE Loaded 6.15 allows remote attackers to perform privileged actions, including uploading and creating arbitrary files, via a direct request to files.php. NOTE: the vendor states "The initial announ...
How severe is CVE-2006-0478?
CVE-2006-0478 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0478?
Check the references section above for vendor advisories and patch information. Affected products include: Cre Loaded Cre Loaded.