Vulnerability Description
TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the upload filter and execute arbitrary code via filenames with double extensions such as ".php.en", ".php.1", and other allowed extensions that are not .txt. NOTE: this is only a vulnerability when the server allows script execution in the pub directory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Twiki | Twiki | 4.0 |
References
- http://secunia.com/advisories/20992PatchVendor Advisory
- http://securitytracker.com/id?1016458ExploitPatch
- http://twiki.org/cgi-bin/view/Codev/SecurityAlertSecureFileUploadsPatch
- http://www.securityfocus.com/bid/18854
- http://www.vupen.com/english/advisories/2006/2677
- http://secunia.com/advisories/20992PatchVendor Advisory
- http://securitytracker.com/id?1016458ExploitPatch
- http://twiki.org/cgi-bin/view/Codev/SecurityAlertSecureFileUploadsPatch
- http://www.securityfocus.com/bid/18854
- http://www.vupen.com/english/advisories/2006/2677
FAQ
What is CVE-2006-3336?
CVE-2006-3336 is a vulnerability with a CVSS score of 4.0 (MEDIUM). TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the upload filter and execute arbitrary code via filenames with double extensions such as ".php.en", ".php.1", and other allowed extensi...
How severe is CVE-2006-3336?
CVE-2006-3336 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3336?
Check the references section above for vendor advisories and patch information. Affected products include: Twiki Twiki.