First published: Thu Dec 21 2006(Updated: )
rtehtmlarea/pi1/class.tx_rtehtmlarea_pi1.php in Typo3 4.0.0 through 4.0.3, 3.7 and 3.8 with the rtehtmlarea extension, and 4.1 beta allows remote authenticated users to execute arbitrary commands via shell metacharacters in the userUid parameter to rtehtmlarea/htmlarea/plugins/SpellChecker/spell-check-logic.php, and possibly another vector.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TYPO3 | =4.0.3 | |
TYPO3 | =4.0.1 | |
TYPO3 | =4.0.2 | |
TYPO3 | =4.0 | |
TYPO3 | =3.7.0 | |
TYPO3 | =3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6690 is rated as high severity due to the potential for remote command execution by authenticated users.
To fix CVE-2006-6690, upgrade Typo3 to version 4.0.4 or later, as these versions contain patches for this vulnerability.
CVE-2006-6690 affects Typo3 versions 4.0.0 through 4.0.3, 3.7, and 3.8 when using the rtehtmlarea extension.
CVE-2006-6690 can be exploited to execute arbitrary shell commands through crafted inputs to the userUid parameter.
Yes, CVE-2006-6690 requires that the attacker be an authenticated user to exploit the vulnerability.