CVE-2006-4548
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
e107 0.75 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary PHP code via the tinyMCE_imglib_include image/jpeg parameter in e107_handlers/tiny_mce/plugins/ibrowser/ibrowser.php, as demonstrated by a multipart/form-data request. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in e107.
e107 0.75 y anteriores no se asignan correctamente variables cuando los datos de entrada incluyen un parámetro numérico con un valor que empareja el valor del hash de un parámetro alfanumérico, lo que permite a un atacante remoto ejecutar código PHP de su elección a través del parámetro tinyMCE_imglib_include image/jpeg en e107_handlers/tiny_mce/plugins/ibrowser/ibrowser como se demostró por una petición a multipart/form-data. NOTA: podría ser discutido que esta vulnerabilidad se deba a un fallo en la desasignación del comando de PHP (CVE-2006-3017) y el arreglo apropiado debe estar en PHP; si es así entonces esto no se debe tratar como vulnerabilidad en e107.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-09-05 CVE Reserved
- 2006-09-06 CVE Published
- 2024-05-12 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/1497 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/444644/100/0/threaded | Mailing List |
URL | Date | SRC |
---|---|---|
http://retrogod.altervista.org/e107_075_xpl.html | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
E107 Search vendor "E107" | E107 Search vendor "E107" for product "E107" | 0.7 Search vendor "E107" for product "E107" and version "0.7" | - |
Affected
| ||||||
E107 Search vendor "E107" | E107 Search vendor "E107" for product "E107" | 0.7.1 Search vendor "E107" for product "E107" and version "0.7.1" | - |
Affected
| ||||||
E107 Search vendor "E107" | E107 Search vendor "E107" for product "E107" | 0.7.2 Search vendor "E107" for product "E107" and version "0.7.2" | - |
Affected
| ||||||
E107 Search vendor "E107" | E107 Search vendor "E107" for product "E107" | 0.7.3 Search vendor "E107" for product "E107" and version "0.7.3" | - |
Affected
| ||||||
E107 Search vendor "E107" | E107 Search vendor "E107" for product "E107" | 0.7.4 Search vendor "E107" for product "E107" and version "0.7.4" | - |
Affected
| ||||||
E107 Search vendor "E107" | E107 Search vendor "E107" for product "E107" | 0.7.5 Search vendor "E107" for product "E107" and version "0.7.5" | - |
Affected
|