Vulnerabilities > CVE-2006-3362
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unrestricted file upload vulnerability in connectors/php/connector.php in FCKeditor mcpuk file manager, as used in (1) Geeklog 1.4.0 through 1.4.0sr3, (2) toendaCMS 1.0.0 Shizouka Stable and earlier, (3) WeBid 0.5.4, and possibly other products, when installed on Apache with mod_mime, allows remote attackers to upload and execute arbitrary PHP code via a filename with a .php extension and a trailing extension that is allowed, such as .zip.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 | |
Application | 4 |
Exploit-Db
description GeekLog. CVE-2006-3362. Webapps exploit for php platform file exploits/php/webapps/1964.php id EDB-ID:1964 last seen 2016-01-31 modified 2006-06-29 platform php port published 2006-06-29 reporter rgod source https://www.exploit-db.com/download/1964/ title GeekLog <= 1.4.0sr3 - 'fuckeditor' Remote Code Execution Exploit type webapps id EDB-ID:2035 id EDB-ID:6344
Nessus
NASL family | CGI abuses |
NASL id | GEEKLOG_FCKEDITOR_TYPE_ARBITRARY_UPLOAD.NASL |
description | The version of Geeklog installed on the remote host includes an older version of FCKeditor that is enabled by default and allows an unauthenticated attacker to upload arbitrary files containing, say, PHP code, and then to execute them subject to the privileges of the web server user id. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21780 |
published | 2006-06-29 |
reporter | This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/21780 |
title | FCKeditor on Apache connector.php Crafted File Extension Arbitrary File Upload |
code |
|
References
- http://retrogod.altervista.org/toenda_100_shizouka_xpl.html
- http://retrogod.altervista.org/toenda_100_shizouka_xpl.html
- http://secunia.com/advisories/20886
- http://secunia.com/advisories/20886
- http://secunia.com/advisories/21117
- http://secunia.com/advisories/21117
- http://www.geeklog.net/article.php/exploit-for-fckeditor-filemanager
- http://www.geeklog.net/article.php/exploit-for-fckeditor-filemanager
- http://www.geeklog.net/article.php/geeklog-1.4.0sr4
- http://www.geeklog.net/article.php/geeklog-1.4.0sr4
- http://www.securityfocus.com/archive/1/440423/100/0/threaded
- http://www.securityfocus.com/archive/1/440423/100/0/threaded
- http://www.securityfocus.com/bid/18767
- http://www.securityfocus.com/bid/18767
- http://www.securityfocus.com/bid/19072
- http://www.securityfocus.com/bid/19072
- http://www.securityfocus.com/bid/30950
- http://www.securityfocus.com/bid/30950
- http://www.vupen.com/english/advisories/2006/2611
- http://www.vupen.com/english/advisories/2006/2611
- http://www.vupen.com/english/advisories/2006/2868
- http://www.vupen.com/english/advisories/2006/2868
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27469
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27469
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27494
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27494
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27799
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27799
- https://www.exploit-db.com/exploits/1964
- https://www.exploit-db.com/exploits/1964
- https://www.exploit-db.com/exploits/2035
- https://www.exploit-db.com/exploits/2035
- https://www.exploit-db.com/exploits/6344
- https://www.exploit-db.com/exploits/6344