Vulnerability Description
PHP remote file inclusion vulnerability in upgrader.php in Vanilla CMS 1.0.1 and earlier, when /conf/old_settings.php exists, allows remote attackers to execute arbitrary PHP code via a URL in the RootDirectory parameter. NOTE: this issue has been disputed by a third party who states that the RootDirectory parameter is initialized before being used, for version 1.0. CVE analysis concurs with the dispute, but it is unclear whether older versions are affected
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lussumo | Vanilla | <= 1.0.1 |
References
- http://securityreason.com/securityalert/1281
- http://securitytracker.com/id?1016568
- http://www.attrition.org/pipermail/vim/2006-July/000937.html
- http://www.attrition.org/pipermail/vim/2006-July/000944.html
- http://www.osvdb.org/28287
- http://www.securityfocus.com/archive/1/440938/100/0/threaded
- http://www.securityfocus.com/archive/1/442450/100/0/threaded
- http://www.securityfocus.com/bid/19127Exploit
- http://securityreason.com/securityalert/1281
- http://securitytracker.com/id?1016568
- http://www.attrition.org/pipermail/vim/2006-July/000937.html
- http://www.attrition.org/pipermail/vim/2006-July/000944.html
- http://www.osvdb.org/28287
- http://www.securityfocus.com/archive/1/440938/100/0/threaded
- http://www.securityfocus.com/archive/1/442450/100/0/threaded
FAQ
What is CVE-2006-3850?
CVE-2006-3850 is a vulnerability with a CVSS score of 5.1 (MEDIUM). PHP remote file inclusion vulnerability in upgrader.php in Vanilla CMS 1.0.1 and earlier, when /conf/old_settings.php exists, allows remote attackers to execute arbitrary PHP code via a URL in the Roo...
How severe is CVE-2006-3850?
CVE-2006-3850 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3850?
Check the references section above for vendor advisories and patch information. Affected products include: Lussumo Vanilla.