Vulnerability Description
PhpMyFactures 1.2 and earlier allows remote attackers to bypass authentication and modify data via direct requests with modified parameters to (1) /tva/ajouter_tva.php, (2) /remises/ajouter_remise.php, (3) /pays/ajouter_pays.php, (4) /pays/modifier_pays.php, (5) /produits/ajouter_cat.php, (6) /produits/ajouter_produit.php, (7) /clients/ajouter_client.php, (8) /clients/modifier_client.php. NOTE: the provenance of this information is unknown; portions of the details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpmyfactures | Phpmyfactures | <= 1.2 |
References
- http://secunia.com/advisories/20642ExploitVendor Advisory
- http://securityreason.com/securityalert/1111
- http://www.acid-root.new.fr/advisories/phpmyfactures.txtExploitVendor Advisory
- http://www.osvdb.org/26477
- http://www.securityfocus.com/archive/1/437025/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27206
- http://secunia.com/advisories/20642ExploitVendor Advisory
- http://securityreason.com/securityalert/1111
- http://www.acid-root.new.fr/advisories/phpmyfactures.txtExploitVendor Advisory
- http://www.osvdb.org/26477
- http://www.securityfocus.com/archive/1/437025/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27206
FAQ
What is CVE-2006-3092?
CVE-2006-3092 is a vulnerability with a CVSS score of 7.5 (HIGH). PhpMyFactures 1.2 and earlier allows remote attackers to bypass authentication and modify data via direct requests with modified parameters to (1) /tva/ajouter_tva.php, (2) /remises/ajouter_remise.php...
How severe is CVE-2006-3092?
CVE-2006-3092 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3092?
Check the references section above for vendor advisories and patch information. Affected products include: Phpmyfactures Phpmyfactures.