7.5
CVSSv2

CVE-2006-5101

Published: 03/10/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote malicious users to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: it has been reported that 4.1 versions might also be affected.

Vulnerable Product Search on Vulmon Subscribe to Product

comdev comdev csv importer 3.1

comdev comdev csv importer 4.1

References

CWE-94http://secunia.com/advisories/22135http://secunia.com/advisories/22133http://secunia.com/advisories/22134http://secunia.com/advisories/22147http://secunia.com/advisories/22149http://secunia.com/advisories/22151http://secunia.com/advisories/22153http://secunia.com/advisories/22154http://secunia.com/advisories/22157http://secunia.com/advisories/22168http://secunia.com/advisories/22169http://www.osvdb.org/29299http://www.osvdb.org/29300http://www.osvdb.org/29301http://www.osvdb.org/29302http://www.osvdb.org/29303http://www.osvdb.org/29305http://www.osvdb.org/29307http://www.osvdb.org/29310http://www.osvdb.org/29311http://www.osvdb.org/29306http://www.osvdb.org/29304http://www.osvdb.org/29308http://www.osvdb.org/29309http://secunia.com/advisories/22170http://securityreason.com/securityalert/1658http://www.vupen.com/english/advisories/2006/3807http://www.vupen.com/english/advisories/2006/3813http://www.vupen.com/english/advisories/2006/3806http://www.vupen.com/english/advisories/2006/3812http://www.vupen.com/english/advisories/2006/3808http://www.vupen.com/english/advisories/2006/3805http://www.vupen.com/english/advisories/2006/3809http://www.vupen.com/english/advisories/2006/3811http://www.vupen.com/english/advisories/2006/3804http://www.vupen.com/english/advisories/2006/3815http://www.vupen.com/english/advisories/2006/3814http://www.vupen.com/english/advisories/2006/3810http://www.vupen.com/english/advisories/2006/3803https://exchange.xforce.ibmcloud.com/vulnerabilities/29220http://www.securityfocus.com/archive/1/447213/100/0/threadedhttp://www.securityfocus.com/archive/1/447209/100/0/threadedhttp://www.securityfocus.com/archive/1/447207/100/0/threadedhttp://www.securityfocus.com/archive/1/447201/100/0/threadedhttp://www.securityfocus.com/archive/1/447194/100/0/threadedhttp://www.securityfocus.com/archive/1/447193/100/0/threadedhttp://www.securityfocus.com/archive/1/447192/100/0/threadedhttp://www.securityfocus.com/archive/1/447190/100/0/threadedhttp://www.securityfocus.com/archive/1/447188/100/0/threadedhttp://www.securityfocus.com/archive/1/447187/100/0/threadedhttp://www.securityfocus.com/archive/1/447186/100/0/threadedhttp://www.securityfocus.com/archive/1/447185/100/0/threadedhttp://www.securityfocus.com/archive/1/447184/100/0/threadedhttps://nvd.nist.gov