Vulnerability Description
SturGeoN Upload allows remote attackers to execute arbitrary PHP code by uploading a file with a .php extension, then directly accessing the file. NOTE: It is uncertain whether this is a vulnerability or a feature of the product.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sturgeon Upload | Sturgeon Upload | All versions |
References
- http://acidr00t.free.fr/poc/sturgeonupv1.txtExploit
- http://www.securityfocus.com/archive/1/438876/100/0/threaded
- http://www.securityfocus.com/bid/18764Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27612
- http://acidr00t.free.fr/poc/sturgeonupv1.txtExploit
- http://www.securityfocus.com/archive/1/438876/100/0/threaded
- http://www.securityfocus.com/bid/18764Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27612
FAQ
What is CVE-2006-3381?
CVE-2006-3381 is a vulnerability with a CVSS score of 7.5 (HIGH). SturGeoN Upload allows remote attackers to execute arbitrary PHP code by uploading a file with a .php extension, then directly accessing the file. NOTE: It is uncertain whether this is a vulnerabilit...
How severe is CVE-2006-3381?
CVE-2006-3381 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3381?
Check the references section above for vendor advisories and patch information. Affected products include: Sturgeon Upload Sturgeon Upload.