First published: Tue Jul 18 2006(Updated: )
The Gallery module in Simone Vellei Flatnuke 2.5.7 and earlier, when Gallery uploads are enabled, does not restrict the extensions of uploaded files that begin with a GIF header, which allows remote authenticated users to execute arbitrary PHP code via an uploaded .php file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb | =1.0 | |
Postnuke Software Foundation Pnphpbb | <=2.5.7 | |
Postnuke Software Foundation Pnphpbb | =1.5 | |
Postnuke Software Foundation Pnphpbb | =2.5.6 | |
Postnuke Software Foundation Pnphpbb | =2.5.1 | |
Postnuke Software Foundation Pnphpbb | =2.5.3 | |
Postnuke Software Foundation Pnphpbb | =1.6 | |
Postnuke Software Foundation Pnphpbb | =2.0 | |
Postnuke Software Foundation Pnphpbb | =2.5.5 | |
Postnuke Software Foundation Pnphpbb | =1.8 | |
Postnuke Software Foundation Pnphpbb | =1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3608 has a high severity rating due to the potential for arbitrary PHP code execution.
To fix CVE-2006-3608, you should upgrade to Flatnuke version 2.5.8 or later, which addresses this vulnerability.
CVE-2006-3608 affects all versions of Flatnuke up to and including 2.5.7.
CVE-2006-3608 facilitates remote code execution through the uploading of malicious files with a GIF header.
Yes, exploitation of CVE-2006-3608 requires that the attacker is an authenticated user.