Vulnerability Description
Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Edgewall Software | Trac | <= 0.9.5 |
References
- http://secunia.com/advisories/20958Vendor Advisory
- http://secunia.com/advisories/21534Vendor Advisory
- http://securitytracker.com/id?1016457
- http://trac.edgewall.org/wiki/ChangeLog
- http://www.debian.org/security/2006/dsa-1152
- http://www.securityfocus.com/bid/18323
- http://www.vupen.com/english/advisories/2006/2729Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27706
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27708
- http://secunia.com/advisories/20958Vendor Advisory
- http://secunia.com/advisories/21534Vendor Advisory
- http://securitytracker.com/id?1016457
- http://trac.edgewall.org/wiki/ChangeLog
- http://www.debian.org/security/2006/dsa-1152
- http://www.securityfocus.com/bid/18323
FAQ
What is CVE-2006-3695?
CVE-2006-3695 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers t...
How severe is CVE-2006-3695?
CVE-2006-3695 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3695?
Check the references section above for vendor advisories and patch information. Affected products include: Edgewall Software Trac.