First published: Wed Dec 06 2006(Updated: )
metaInfo.php in TorrentFlux 2.2, when $cfg["enable_file_priority"] is false, allows remote attackers to execute arbitrary commands via shell metacharacters (backticks) in the torrent parameter to (1) details.php and (2) startpop.php.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TorrentFlux | =2.2 |
http://bugs.debian.org/cgi-bin/bugreport.cgi/11_missed_security_fixes.dpatch?bug=400582;msg=71;att=1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6331 is classified as a critical vulnerability due to its potential for remote command execution.
To fix CVE-2006-6331, you should update TorrentFlux to a version that addresses this vulnerability.
CVE-2006-6331 allows remote attackers to execute arbitrary commands on the server via crafted torrent parameters.
CVE-2006-6331 specifically affects TorrentFlux version 2.2.
The vulnerability is exacerbated when the configuration setting $cfg["enable_file_priority"] is set to false.