Vulnerability Description
PHP remote file inclusion vulnerability in install/upgrade_301.php in Jelsoft vBulletin 3.5.4 allows remote attackers to execute arbitrary PHP code via a URL in the step parameter. NOTE: the vendor has disputed this vulnerability, saying "The default vBulletin requires authentication prior to the usage of the upgrade system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jelsoft | Vbulletin | 3.5.4 |
References
- http://archives.neohapsis.com/archives/bugtraq/2006-07/0061.htmlExploit
- http://archives.neohapsis.com/archives/bugtraq/2006-07/0069.html
- http://archives.neohapsis.com/archives/bugtraq/2006-07/0121.html
- http://archives.neohapsis.com/archives/bugtraq/2006-07/0217.html
- http://www.osvdb.org/28210
- http://www.pldsoft.com/forum/showthread.php?t=1340
- http://archives.neohapsis.com/archives/bugtraq/2006-07/0061.htmlExploit
- http://archives.neohapsis.com/archives/bugtraq/2006-07/0069.html
- http://archives.neohapsis.com/archives/bugtraq/2006-07/0121.html
- http://archives.neohapsis.com/archives/bugtraq/2006-07/0217.html
- http://www.osvdb.org/28210
- http://www.pldsoft.com/forum/showthread.php?t=1340
FAQ
What is CVE-2006-4271?
CVE-2006-4271 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in install/upgrade_301.php in Jelsoft vBulletin 3.5.4 allows remote attackers to execute arbitrary PHP code via a URL in the step parameter. NOTE: the vendor h...
How severe is CVE-2006-4271?
CVE-2006-4271 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4271?
Check the references section above for vendor advisories and patch information. Affected products include: Jelsoft Vbulletin.