Vulnerability Description
The Admin Upload Image functionality in Joomla! before 1.0.11 allows remote authenticated users to upload files outside of the /images/stories/ directory via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomla | Joomla\! | < 1.0.11 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/21666Third Party Advisory
- http://www.joomla.org/content/view/1841/78/Vendor Advisory
- http://www.joomla.org/content/view/1843/74/Vendor Advisory
- http://www.vupen.com/english/advisories/2006/3408Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28630Third Party AdvisoryVDB Entry
- http://secunia.com/advisories/21666Third Party Advisory
- http://www.joomla.org/content/view/1841/78/Vendor Advisory
- http://www.joomla.org/content/view/1843/74/Vendor Advisory
- http://www.vupen.com/english/advisories/2006/3408Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28630Third Party AdvisoryVDB Entry
FAQ
What is CVE-2006-4471?
CVE-2006-4471 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Admin Upload Image functionality in Joomla! before 1.0.11 allows remote authenticated users to upload files outside of the /images/stories/ directory via unspecified vectors.
How severe is CVE-2006-4471?
CVE-2006-4471 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4471?
Check the references section above for vendor advisories and patch information. Affected products include: Joomla Joomla\!.