Executive Summary

Informations
Name CVE-2006-6690 First vendor Publication 2006-12-21
Vendor Cve Last vendor Modification 2018-10-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

rtehtmlarea/pi1/class.tx_rtehtmlarea_pi1.php in Typo3 4.0.0 through 4.0.3, 3.7 and 3.8 with the rtehtmlarea extension, and 4.1 beta allows remote authenticated users to execute arbitrary commands via shell metacharacters in the userUid parameter to rtehtmlarea/htmlarea/plugins/SpellChecker/spell-check-logic.php, and possibly another vector.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6690

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6

Open Source Vulnerability Database (OSVDB)

Id Description
30890 TYPO3 (class.tx_rtehtmlarea_pi1.php) spell-check-logic.php userUid Arbitrary ...

Nessus® Vulnerability Scanner

Date Description
2006-12-21 Name : The remote web server contains a PHP script that allows arbitrary command exe...
File : typo3_useruid_cmd_exec.nasl - Type : ACT_ATTACK

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/21680
BUGTRAQ http://www.securityfocus.com/archive/1/454944/100/0/threaded
CONFIRM http://typo3.org/news-single-view/?tx_newsimporter_pi1%5BshowItem%5D=0&cH...
MISC http://www.sec-consult.com/272.html
MLIST http://lists.netfielders.de/pipermail/typo3-announce/2006/000045.html
http://lists.netfielders.de/pipermail/typo3-announce/2006/000046.html
SECTRACK http://securitytracker.com/id?1017428
SECUNIA http://secunia.com/advisories/23446
http://secunia.com/advisories/23466
SREASON http://securityreason.com/securityalert/2056
VUPEN http://www.vupen.com/english/advisories/2006/5094

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2021-05-04 12:05:02
  • Multiple Updates
2021-04-22 01:05:36
  • Multiple Updates
2020-05-23 00:18:53
  • Multiple Updates
2018-10-18 00:19:50
  • Multiple Updates
2016-04-26 15:27:38
  • Multiple Updates
2014-02-17 10:38:13
  • Multiple Updates
2013-05-11 11:17:29
  • Multiple Updates