Vulnerability Description
Direct static code injection vulnerability in sysinfo.cgi in sysinfo 1.21 and possibly other versions before 2.25 allows remote attackers to execute arbitrary commands via a leading ; (semicolon) in the name parameter in a systemdoc action, which is injected into phpinfo.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Coder-World | Sysinfo | 1.21 |
References
- http://secunia.com/advisories/19690Vendor Advisory
- http://www.securityfocus.com/bid/17523ExploitPatch
- http://www.vupen.com/english/advisories/2006/1360
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25906
- https://www.exploit-db.com/exploits/1677
- http://secunia.com/advisories/19690Vendor Advisory
- http://www.securityfocus.com/bid/17523ExploitPatch
- http://www.vupen.com/english/advisories/2006/1360
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25906
- https://www.exploit-db.com/exploits/1677
FAQ
What is CVE-2006-1831?
CVE-2006-1831 is a vulnerability with a CVSS score of 7.5 (HIGH). Direct static code injection vulnerability in sysinfo.cgi in sysinfo 1.21 and possibly other versions before 2.25 allows remote attackers to execute arbitrary commands via a leading ; (semicolon) in t...
How severe is CVE-2006-1831?
CVE-2006-1831 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1831?
Check the references section above for vendor advisories and patch information. Affected products include: Coder-World Sysinfo.