First published: Fri May 19 2006(Updated: )
The Update functionality in Bitrix Site Manager 4.1.x does not verify the authenticity of downloaded updates, which allows remote attackers to obtain sensitive information and ultimately execute arbitrary PHP code via DNS cache poisoning that redirects the user to a malicious site.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bitrix Site Manager | =4.0.0 | |
Bitrix Site Manager | =4.0.2 | |
Bitrix Site Manager | =4.0.3 | |
Bitrix Site Manager | =4.0.4 | |
Bitrix Site Manager | =4.0.5 | |
Bitrix Site Manager | =4.0.6 | |
Bitrix Site Manager | =4.0.7 | |
Bitrix Site Manager | =4.0.8 | |
Bitrix Site Manager | =4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2479 has a high severity rating due to the potential for remote attackers to execute arbitrary PHP code.
To fix CVE-2006-2479, ensure that you are using a version of Bitrix Site Manager that has addressed this vulnerability by validating downloaded updates.
CVE-2006-2479 affects Bitrix Site Manager versions from 4.0.0 to 4.1.0.
If exploited, CVE-2006-2479 can lead to unauthorized access to sensitive information and the execution of malicious code.
A possible workaround for CVE-2006-2479 is to limit external DNS requests or to monitor updates closely to avoid redirecting to malicious sites.