Vulnerability Description
The eyeHome function in apps/eyeHome.eyeapp/aplic.php in EyeOS before 0.9.3-3 allows remote attackers to upload and execute arbitrary code via dangerous file extensions that are not all lowercase, which bypasses a cleansing operation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eyeos | Eyeos | 0.9.2 |
References
- http://eyeos.blogspot.com/2006/12/eyeos-093-4-released-webmail-eyeapp.htmlPatch
- http://prdownloads.sourceforge.net/eyeos/eyeOS-0.9.3-4.tar.gz?downloadPatch
- http://secunia.com/advisories/23388
- http://www.securityfocus.com/bid/21639
- http://www.vupen.com/english/advisories/2006/4962
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30844
- http://eyeos.blogspot.com/2006/12/eyeos-093-4-released-webmail-eyeapp.htmlPatch
- http://prdownloads.sourceforge.net/eyeos/eyeOS-0.9.3-4.tar.gz?downloadPatch
- http://secunia.com/advisories/23388
- http://www.securityfocus.com/bid/21639
- http://www.vupen.com/english/advisories/2006/4962
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30844
FAQ
What is CVE-2006-6556?
CVE-2006-6556 is a vulnerability with a CVSS score of 7.5 (HIGH). The eyeHome function in apps/eyeHome.eyeapp/aplic.php in EyeOS before 0.9.3-3 allows remote attackers to upload and execute arbitrary code via dangerous file extensions that are not all lowercase, whi...
How severe is CVE-2006-6556?
CVE-2006-6556 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6556?
Check the references section above for vendor advisories and patch information. Affected products include: Eyeos Eyeos.