CVE-2006-6511
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/12/2006
Last modified:
09/04/2025
Description
dadaIMC .99.3 uses an insufficiently restrictive FilesMatch directive in the installed .htaccess file, which allows remote attackers to execute arbitrary PHP code by uploading files whose names contain (1) feature, (2) editor, (3) newswire, (4) otherpress, (5) admin, (6) pbook, (7) media, or (8) mod, which are processed as PHP file types (application/x-httpd-php).
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:dadaimc:dadaimc:*:*:*:*:*:*:*:* | 0.99.3 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.dadaimc.org/view.php?id=191
- http://secunia.com/advisories/23305
- http://www.vupen.com/english/advisories/2006/4977
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30862
- http://bugs.dadaimc.org/view.php?id=191
- http://secunia.com/advisories/23305
- http://www.vupen.com/english/advisories/2006/4977
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30862