Vulnerability Description
Jelsoft vBulletin accepts uploads of Cascading Style Sheets (CSS) and processes them in a way that allows remote authenticated administrators to gain shell access by uploading a CSS file that contains PHP code, then selecting the file via the style chooser, which causes the PHP code to be executed. NOTE: the vendor was unable to reproduce this issue in 3.5.x. NOTE: this issue might be due to direct static code injection.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jelsoft | Vbulletin | 3.5.8 |
References
- http://b3hr0uz.persiangig.com/VbStyleVuln.txtExploit
- http://www.securityfocus.com/archive/1/433580/100/0/threaded
- http://www.securityfocus.com/archive/1/433678/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26440
- http://b3hr0uz.persiangig.com/VbStyleVuln.txtExploit
- http://www.securityfocus.com/archive/1/433580/100/0/threaded
- http://www.securityfocus.com/archive/1/433678/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26440
FAQ
What is CVE-2006-2335?
CVE-2006-2335 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Jelsoft vBulletin accepts uploads of Cascading Style Sheets (CSS) and processes them in a way that allows remote authenticated administrators to gain shell access by uploading a CSS file that contains...
How severe is CVE-2006-2335?
CVE-2006-2335 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2335?
Check the references section above for vendor advisories and patch information. Affected products include: Jelsoft Vbulletin.