Vulnerability Description
dadaIMC .99.3 uses an insufficiently restrictive FilesMatch directive in the installed .htaccess file, which allows remote attackers to execute arbitrary PHP code by uploading files whose names contain (1) feature, (2) editor, (3) newswire, (4) otherpress, (5) admin, (6) pbook, (7) media, or (8) mod, which are processed as PHP file types (application/x-httpd-php).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dadaimc | Dadaimc | <= 0.99.3 |
References
- http://bugs.dadaimc.org/view.php?id=191
- http://secunia.com/advisories/23305Vendor Advisory
- http://www.vupen.com/english/advisories/2006/4977
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30862
- http://bugs.dadaimc.org/view.php?id=191
- http://secunia.com/advisories/23305Vendor Advisory
- http://www.vupen.com/english/advisories/2006/4977
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30862
FAQ
What is CVE-2006-6511?
CVE-2006-6511 is a vulnerability with a CVSS score of 6.8 (MEDIUM). dadaIMC .99.3 uses an insufficiently restrictive FilesMatch directive in the installed .htaccess file, which allows remote attackers to execute arbitrary PHP code by uploading files whose names contai...
How severe is CVE-2006-6511?
CVE-2006-6511 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6511?
Check the references section above for vendor advisories and patch information. Affected products include: Dadaimc Dadaimc.