ID CVE-2006-0478
Summary CRE Loaded 6.15 allows remote attackers to perform privileged actions, including uploading and creating arbitrary files, via a direct request to files.php. NOTE: the vendor states "The initial announcement of this risk was made on our website... and it included a patch which will close the vulnerability on all known 6.0x and 6.1x releases. We strongly encourage users of CRE Loaded 6.x, osCMax, and other users of osCommerce who have installed HTMLArea based WYSIWYG editors and Admin Access with Levels to modify thier installations at the earliest possible moment."
References
Vulnerable Configurations
  • cpe:2.3:a:cre_loaded:cre_loaded:6.15:*:*:*:*:*:*:*
    cpe:2.3:a:cre_loaded:cre_loaded:6.15:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 20-07-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 16415
osvdb 22793
secunia 18648
vim 20060203 vendor ack/fix: 22793: CRE Loaded files.php Unauthenticated Arbitrary File Upload (fwd)
vupen ADV-2006-0373
xf creloaded-files-auth-bypass(24377)
Last major update 20-07-2017 - 01:29
Published 31-01-2006 - 11:03
Last modified 20-07-2017 - 01:29
Back to Top