Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-2878 | First vendor Publication | 2006-06-06 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The spellchecker (spellcheck.php) in DokuWiki 2006/06/04 and earlier allows remote attackers to insert and execute arbitrary PHP code via "complex curly syntax" that is inserted into a regular expression that is processed by preg_replace with the /e (executable) modifier. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2878 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200606-16 (DokuWiki) File : nvt/glsa_200606_16.nasl |
2008-09-04 | Name : FreeBSD Ports: dokuwiki File : nvt/freebsd_dokuwiki.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
25980 | DokuWiki Spell Checker Embedded Link Arbitrary PHP Code Execution DokuWiki contains a flaw that may allow a malicious user to execute arbitrary PHP code. The issue is triggered due to an error in the spell checker when processing links embedded in text being spell checked. It is possible that the flaw may allow arbitrary PHP code execution resulting in a loss of inegrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-06-16 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200606-16.nasl - Type : ACT_GATHER_INFO |
2006-06-06 | Name : The remote web server contains a PHP application that is affected by an arbit... File : dokuwiki_spellcheck_cmd_exec.nasl - Type : ACT_ATTACK |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:20:20 |
|
2024-11-28 12:09:08 |
|
2021-05-05 01:02:30 |
|
2021-05-04 12:04:08 |
|
2021-04-22 01:04:44 |
|
2020-05-24 01:02:23 |
|
2020-05-23 00:17:54 |
|
2018-10-18 21:20:11 |
|
2017-07-20 09:23:39 |
|
2016-06-28 15:49:05 |
|
2016-04-26 14:43:10 |
|
2014-02-17 10:36:07 |
|
2013-05-11 10:59:40 |
|