Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-3336

Опубликовано: 05 июл. 2006
Источник: ubuntu
Приоритет: medium
CVSS2: 4

Описание

TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the upload filter and execute arbitrary code via filenames with double extensions such as ".php.en", ".php.1", and other allowed extensions that are not .txt. NOTE: this is only a vulnerability when the server allows script execution in the pub directory.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

edgy

ignored

end of life, was needed
feisty

released

4.0.5-9.1ubuntu1
gutsy

released

4.0.5-9.1ubuntu1
hardy

released

4.0.5-9.1ubuntu1
intrepid

released

4.0.5-9.1ubuntu1
jaunty

released

4.0.5-9.1ubuntu1
karmic

released

4.0.5-9.1ubuntu1
upstream

needs-triage

Показывать по

Ссылки на источники

4 Medium

CVSS2

Связанные уязвимости

nvd
около 19 лет назад

TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the upload filter and execute arbitrary code via filenames with double extensions such as ".php.en", ".php.1", and other allowed extensions that are not .txt. NOTE: this is only a vulnerability when the server allows script execution in the pub directory.

debian
около 19 лет назад

TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the up ...

github
больше 3 лет назад

TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the upload filter and execute arbitrary code via filenames with double extensions such as ".php.en", ".php.1", and other allowed extensions that are not .txt. NOTE: this is only a vulnerability when the server allows script execution in the pub directory.

4 Medium

CVSS2