Search criteria

3 vulnerabilities found for comdev_csv_importer by comdev

FKIE_CVE-2006-5101

Vulnerability from fkie_nvd - Published: 2006-10-03 04:03 - Updated: 2025-04-09 00:30
Severity ?
Summary
PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: it has been reported that 4.1 versions might also be affected.
References
cve@mitre.orghttp://secunia.com/advisories/22133Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22134Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22135Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22147Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22149Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22151Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22153Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22154Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22157Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22168Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22169Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22170Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/1658
cve@mitre.orghttp://www.osvdb.org/29299
cve@mitre.orghttp://www.osvdb.org/29300
cve@mitre.orghttp://www.osvdb.org/29301
cve@mitre.orghttp://www.osvdb.org/29302
cve@mitre.orghttp://www.osvdb.org/29303
cve@mitre.orghttp://www.osvdb.org/29304
cve@mitre.orghttp://www.osvdb.org/29305
cve@mitre.orghttp://www.osvdb.org/29306
cve@mitre.orghttp://www.osvdb.org/29307
cve@mitre.orghttp://www.osvdb.org/29308
cve@mitre.orghttp://www.osvdb.org/29309
cve@mitre.orghttp://www.osvdb.org/29310
cve@mitre.orghttp://www.osvdb.org/29311
cve@mitre.orghttp://www.securityfocus.com/archive/1/447184/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447185/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447186/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447187/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447188/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447190/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447192/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447193/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447194/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447201/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447207/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447209/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/447213/100/0/threaded
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3803
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3804Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3805
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3806
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3807Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3808Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3809Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3810
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3811
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3812
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3813Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3814
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3815Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/29220
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22133Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22134Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22135Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22147Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22149Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22151Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22153Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22154Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22157Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22168Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22169Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22170Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/1658
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29299
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29300
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29301
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29302
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29303
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29304
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29305
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29306
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29307
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29308
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29309
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29310
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29311
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447184/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447185/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447186/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447187/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447188/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447190/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447192/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447193/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447194/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447201/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447207/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447209/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447213/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3803
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3804Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3805
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3806
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3807Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3808Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3809Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3810
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3811
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3812
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3813Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3814
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3815Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/29220
Impacted products
Vendor Product Version
comdev comdev_csv_importer 3.1
comdev comdev_csv_importer 4.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comdev:comdev_csv_importer:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EFE7E5-D332-4436-BE54-B50D4FE94055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comdev:comdev_csv_importer:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF1B3C80-7ED6-4676-A33D-B658BC1085F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter.  NOTE: it has been reported that 4.1 versions might also be affected."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad PHP de inclusi\u00f3n remota de archivo en include.php en Comdev CSV Importer 3.1 y posiblemente 4.1, utilizado en (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, y (12) Comdev eCommerce 3.1, permite a un atacante remoto ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de un URL en el par\u00e1metro path[\"docroot\"]."
    }
  ],
  "id": "CVE-2006-5101",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-10-03T04:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22133"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22134"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22135"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22147"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22149"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22151"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22153"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22154"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22157"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22168"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22169"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22170"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1658"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29299"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29300"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29301"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29302"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29303"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29304"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29305"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29307"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29308"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29309"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29310"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/29311"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3803"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3804"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3805"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3806"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3807"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3808"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3809"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3810"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3811"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3812"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3813"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3814"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3815"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22147"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29299"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29300"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29303"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29305"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29307"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/29311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3804"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3805"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3806"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3807"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3808"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3809"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3810"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3812"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3814"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3815"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2006-5101 (GCVE-0-2006-5101)

Vulnerability from cvelistv5 – Published: 2006-10-02 20:00 – Updated: 2024-08-07 19:41
VLAI?
Summary
PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: it has been reported that 4.1 versions might also be affected.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2006/3807 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/3811 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/29300 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/29310 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/447190/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/22147 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/22157 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/447192/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/447194/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/29303 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/3806 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/22153 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/22169 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3809 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/3813 vdb-entryx_refsource_VUPEN
http://securityreason.com/securityalert/1658 third-party-advisoryx_refsource_SREASON
http://www.osvdb.org/29305 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/447209/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/29311 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/22170 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/447187/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/29307 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/447213/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/22168 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/447207/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/29304 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/22149 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3808 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/447186/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3804 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/22135 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/29306 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/22154 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/22134 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3812 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/447201/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3810 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/29308 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/22133 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/29302 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/447188/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3805 vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.osvdb.org/29301 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/3803 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/29299 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/447185/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/447193/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/22151 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3814 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/447184/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/29309 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/3815 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:41:05.237Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-3807",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3807"
          },
          {
            "name": "ADV-2006-3811",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3811"
          },
          {
            "name": "29300",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29300"
          },
          {
            "name": "29310",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29310"
          },
          {
            "name": "20060927 Comdev News Publisher 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded"
          },
          {
            "name": "22147",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22147"
          },
          {
            "name": "22157",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22157"
          },
          {
            "name": "20060927 Comdev Contact Form 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded"
          },
          {
            "name": "20060927 Comdev eCommerce 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded"
          },
          {
            "name": "29303",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29303"
          },
          {
            "name": "ADV-2006-3806",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3806"
          },
          {
            "name": "22153",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22153"
          },
          {
            "name": "22169",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22169"
          },
          {
            "name": "ADV-2006-3809",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3809"
          },
          {
            "name": "ADV-2006-3813",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3813"
          },
          {
            "name": "1658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1658"
          },
          {
            "name": "29305",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29305"
          },
          {
            "name": "20060927 Comdev Newsletter 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded"
          },
          {
            "name": "29311",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29311"
          },
          {
            "name": "22170",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22170"
          },
          {
            "name": "20060927 Comdev Photo Gallery 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded"
          },
          {
            "name": "29307",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29307"
          },
          {
            "name": "20060927 Comdev Events Calendar 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded"
          },
          {
            "name": "22168",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22168"
          },
          {
            "name": "20060927 Comdev Guestbook 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded"
          },
          {
            "name": "29304",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29304"
          },
          {
            "name": "22149",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22149"
          },
          {
            "name": "ADV-2006-3808",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3808"
          },
          {
            "name": "20060927 Comdev Vote Caster 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded"
          },
          {
            "name": "ADV-2006-3804",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3804"
          },
          {
            "name": "22135",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22135"
          },
          {
            "name": "29306",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29306"
          },
          {
            "name": "22154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22154"
          },
          {
            "name": "22134",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22134"
          },
          {
            "name": "ADV-2006-3812",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3812"
          },
          {
            "name": "20060927 Comdev FAQ Support 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded"
          },
          {
            "name": "ADV-2006-3810",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3810"
          },
          {
            "name": "29308",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29308"
          },
          {
            "name": "22133",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22133"
          },
          {
            "name": "29302",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29302"
          },
          {
            "name": "20060927 Comdev Customer Helpdesk 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded"
          },
          {
            "name": "ADV-2006-3805",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3805"
          },
          {
            "name": "comdev-include-file-include(29220)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220"
          },
          {
            "name": "29301",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29301"
          },
          {
            "name": "ADV-2006-3803",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3803"
          },
          {
            "name": "29299",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29299"
          },
          {
            "name": "20060927 Comdev Links Directory 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded"
          },
          {
            "name": "20060927 Comdev Web Blogger 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded"
          },
          {
            "name": "22151",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22151"
          },
          {
            "name": "ADV-2006-3814",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3814"
          },
          {
            "name": "20060927 Comdev CSV Importer 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded"
          },
          {
            "name": "29309",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29309"
          },
          {
            "name": "ADV-2006-3815",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3815"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter.  NOTE: it has been reported that 4.1 versions might also be affected."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-3807",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3807"
        },
        {
          "name": "ADV-2006-3811",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3811"
        },
        {
          "name": "29300",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29300"
        },
        {
          "name": "29310",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29310"
        },
        {
          "name": "20060927 Comdev News Publisher 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded"
        },
        {
          "name": "22147",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22147"
        },
        {
          "name": "22157",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22157"
        },
        {
          "name": "20060927 Comdev Contact Form 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded"
        },
        {
          "name": "20060927 Comdev eCommerce 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded"
        },
        {
          "name": "29303",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29303"
        },
        {
          "name": "ADV-2006-3806",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3806"
        },
        {
          "name": "22153",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22153"
        },
        {
          "name": "22169",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22169"
        },
        {
          "name": "ADV-2006-3809",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3809"
        },
        {
          "name": "ADV-2006-3813",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3813"
        },
        {
          "name": "1658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1658"
        },
        {
          "name": "29305",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29305"
        },
        {
          "name": "20060927 Comdev Newsletter 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded"
        },
        {
          "name": "29311",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29311"
        },
        {
          "name": "22170",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22170"
        },
        {
          "name": "20060927 Comdev Photo Gallery 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded"
        },
        {
          "name": "29307",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29307"
        },
        {
          "name": "20060927 Comdev Events Calendar 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded"
        },
        {
          "name": "22168",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22168"
        },
        {
          "name": "20060927 Comdev Guestbook 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded"
        },
        {
          "name": "29304",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29304"
        },
        {
          "name": "22149",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22149"
        },
        {
          "name": "ADV-2006-3808",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3808"
        },
        {
          "name": "20060927 Comdev Vote Caster 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded"
        },
        {
          "name": "ADV-2006-3804",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3804"
        },
        {
          "name": "22135",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22135"
        },
        {
          "name": "29306",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29306"
        },
        {
          "name": "22154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22154"
        },
        {
          "name": "22134",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22134"
        },
        {
          "name": "ADV-2006-3812",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3812"
        },
        {
          "name": "20060927 Comdev FAQ Support 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded"
        },
        {
          "name": "ADV-2006-3810",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3810"
        },
        {
          "name": "29308",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29308"
        },
        {
          "name": "22133",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22133"
        },
        {
          "name": "29302",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29302"
        },
        {
          "name": "20060927 Comdev Customer Helpdesk 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded"
        },
        {
          "name": "ADV-2006-3805",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3805"
        },
        {
          "name": "comdev-include-file-include(29220)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220"
        },
        {
          "name": "29301",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29301"
        },
        {
          "name": "ADV-2006-3803",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3803"
        },
        {
          "name": "29299",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29299"
        },
        {
          "name": "20060927 Comdev Links Directory 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded"
        },
        {
          "name": "20060927 Comdev Web Blogger 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded"
        },
        {
          "name": "22151",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22151"
        },
        {
          "name": "ADV-2006-3814",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3814"
        },
        {
          "name": "20060927 Comdev CSV Importer 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded"
        },
        {
          "name": "29309",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29309"
        },
        {
          "name": "ADV-2006-3815",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3815"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5101",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter.  NOTE: it has been reported that 4.1 versions might also be affected."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-3807",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3807"
            },
            {
              "name": "ADV-2006-3811",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3811"
            },
            {
              "name": "29300",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29300"
            },
            {
              "name": "29310",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29310"
            },
            {
              "name": "20060927 Comdev News Publisher 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded"
            },
            {
              "name": "22147",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22147"
            },
            {
              "name": "22157",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22157"
            },
            {
              "name": "20060927 Comdev Contact Form 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded"
            },
            {
              "name": "20060927 Comdev eCommerce 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded"
            },
            {
              "name": "29303",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29303"
            },
            {
              "name": "ADV-2006-3806",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3806"
            },
            {
              "name": "22153",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22153"
            },
            {
              "name": "22169",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22169"
            },
            {
              "name": "ADV-2006-3809",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3809"
            },
            {
              "name": "ADV-2006-3813",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3813"
            },
            {
              "name": "1658",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1658"
            },
            {
              "name": "29305",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29305"
            },
            {
              "name": "20060927 Comdev Newsletter 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded"
            },
            {
              "name": "29311",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29311"
            },
            {
              "name": "22170",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22170"
            },
            {
              "name": "20060927 Comdev Photo Gallery 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded"
            },
            {
              "name": "29307",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29307"
            },
            {
              "name": "20060927 Comdev Events Calendar 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded"
            },
            {
              "name": "22168",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22168"
            },
            {
              "name": "20060927 Comdev Guestbook 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded"
            },
            {
              "name": "29304",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29304"
            },
            {
              "name": "22149",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22149"
            },
            {
              "name": "ADV-2006-3808",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3808"
            },
            {
              "name": "20060927 Comdev Vote Caster 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded"
            },
            {
              "name": "ADV-2006-3804",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3804"
            },
            {
              "name": "22135",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22135"
            },
            {
              "name": "29306",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29306"
            },
            {
              "name": "22154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22154"
            },
            {
              "name": "22134",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22134"
            },
            {
              "name": "ADV-2006-3812",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3812"
            },
            {
              "name": "20060927 Comdev FAQ Support 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded"
            },
            {
              "name": "ADV-2006-3810",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3810"
            },
            {
              "name": "29308",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29308"
            },
            {
              "name": "22133",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22133"
            },
            {
              "name": "29302",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29302"
            },
            {
              "name": "20060927 Comdev Customer Helpdesk 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded"
            },
            {
              "name": "ADV-2006-3805",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3805"
            },
            {
              "name": "comdev-include-file-include(29220)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220"
            },
            {
              "name": "29301",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29301"
            },
            {
              "name": "ADV-2006-3803",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3803"
            },
            {
              "name": "29299",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29299"
            },
            {
              "name": "20060927 Comdev Links Directory 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded"
            },
            {
              "name": "20060927 Comdev Web Blogger 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded"
            },
            {
              "name": "22151",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22151"
            },
            {
              "name": "ADV-2006-3814",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3814"
            },
            {
              "name": "20060927 Comdev CSV Importer 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded"
            },
            {
              "name": "29309",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29309"
            },
            {
              "name": "ADV-2006-3815",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3815"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5101",
    "datePublished": "2006-10-02T20:00:00",
    "dateReserved": "2006-10-02T00:00:00",
    "dateUpdated": "2024-08-07T19:41:05.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5101 (GCVE-0-2006-5101)

Vulnerability from nvd – Published: 2006-10-02 20:00 – Updated: 2024-08-07 19:41
VLAI?
Summary
PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: it has been reported that 4.1 versions might also be affected.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2006/3807 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/3811 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/29300 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/29310 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/447190/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/22147 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/22157 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/447192/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/447194/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/29303 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/3806 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/22153 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/22169 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3809 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/3813 vdb-entryx_refsource_VUPEN
http://securityreason.com/securityalert/1658 third-party-advisoryx_refsource_SREASON
http://www.osvdb.org/29305 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/447209/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/29311 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/22170 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/447187/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/29307 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/447213/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/22168 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/447207/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/29304 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/22149 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3808 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/447186/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3804 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/22135 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/29306 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/22154 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/22134 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3812 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/447201/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3810 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/29308 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/22133 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/29302 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/447188/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3805 vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.osvdb.org/29301 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/3803 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/29299 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/447185/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/447193/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/22151 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3814 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/447184/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/29309 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/3815 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:41:05.237Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-3807",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3807"
          },
          {
            "name": "ADV-2006-3811",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3811"
          },
          {
            "name": "29300",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29300"
          },
          {
            "name": "29310",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29310"
          },
          {
            "name": "20060927 Comdev News Publisher 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded"
          },
          {
            "name": "22147",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22147"
          },
          {
            "name": "22157",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22157"
          },
          {
            "name": "20060927 Comdev Contact Form 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded"
          },
          {
            "name": "20060927 Comdev eCommerce 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded"
          },
          {
            "name": "29303",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29303"
          },
          {
            "name": "ADV-2006-3806",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3806"
          },
          {
            "name": "22153",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22153"
          },
          {
            "name": "22169",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22169"
          },
          {
            "name": "ADV-2006-3809",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3809"
          },
          {
            "name": "ADV-2006-3813",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3813"
          },
          {
            "name": "1658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1658"
          },
          {
            "name": "29305",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29305"
          },
          {
            "name": "20060927 Comdev Newsletter 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded"
          },
          {
            "name": "29311",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29311"
          },
          {
            "name": "22170",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22170"
          },
          {
            "name": "20060927 Comdev Photo Gallery 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded"
          },
          {
            "name": "29307",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29307"
          },
          {
            "name": "20060927 Comdev Events Calendar 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded"
          },
          {
            "name": "22168",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22168"
          },
          {
            "name": "20060927 Comdev Guestbook 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded"
          },
          {
            "name": "29304",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29304"
          },
          {
            "name": "22149",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22149"
          },
          {
            "name": "ADV-2006-3808",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3808"
          },
          {
            "name": "20060927 Comdev Vote Caster 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded"
          },
          {
            "name": "ADV-2006-3804",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3804"
          },
          {
            "name": "22135",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22135"
          },
          {
            "name": "29306",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29306"
          },
          {
            "name": "22154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22154"
          },
          {
            "name": "22134",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22134"
          },
          {
            "name": "ADV-2006-3812",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3812"
          },
          {
            "name": "20060927 Comdev FAQ Support 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded"
          },
          {
            "name": "ADV-2006-3810",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3810"
          },
          {
            "name": "29308",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29308"
          },
          {
            "name": "22133",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22133"
          },
          {
            "name": "29302",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29302"
          },
          {
            "name": "20060927 Comdev Customer Helpdesk 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded"
          },
          {
            "name": "ADV-2006-3805",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3805"
          },
          {
            "name": "comdev-include-file-include(29220)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220"
          },
          {
            "name": "29301",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29301"
          },
          {
            "name": "ADV-2006-3803",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3803"
          },
          {
            "name": "29299",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29299"
          },
          {
            "name": "20060927 Comdev Links Directory 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded"
          },
          {
            "name": "20060927 Comdev Web Blogger 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded"
          },
          {
            "name": "22151",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22151"
          },
          {
            "name": "ADV-2006-3814",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3814"
          },
          {
            "name": "20060927 Comdev CSV Importer 3.1 :) \u003c= Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded"
          },
          {
            "name": "29309",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/29309"
          },
          {
            "name": "ADV-2006-3815",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3815"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter.  NOTE: it has been reported that 4.1 versions might also be affected."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-3807",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3807"
        },
        {
          "name": "ADV-2006-3811",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3811"
        },
        {
          "name": "29300",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29300"
        },
        {
          "name": "29310",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29310"
        },
        {
          "name": "20060927 Comdev News Publisher 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded"
        },
        {
          "name": "22147",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22147"
        },
        {
          "name": "22157",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22157"
        },
        {
          "name": "20060927 Comdev Contact Form 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded"
        },
        {
          "name": "20060927 Comdev eCommerce 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded"
        },
        {
          "name": "29303",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29303"
        },
        {
          "name": "ADV-2006-3806",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3806"
        },
        {
          "name": "22153",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22153"
        },
        {
          "name": "22169",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22169"
        },
        {
          "name": "ADV-2006-3809",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3809"
        },
        {
          "name": "ADV-2006-3813",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3813"
        },
        {
          "name": "1658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1658"
        },
        {
          "name": "29305",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29305"
        },
        {
          "name": "20060927 Comdev Newsletter 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded"
        },
        {
          "name": "29311",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29311"
        },
        {
          "name": "22170",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22170"
        },
        {
          "name": "20060927 Comdev Photo Gallery 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded"
        },
        {
          "name": "29307",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29307"
        },
        {
          "name": "20060927 Comdev Events Calendar 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded"
        },
        {
          "name": "22168",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22168"
        },
        {
          "name": "20060927 Comdev Guestbook 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded"
        },
        {
          "name": "29304",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29304"
        },
        {
          "name": "22149",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22149"
        },
        {
          "name": "ADV-2006-3808",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3808"
        },
        {
          "name": "20060927 Comdev Vote Caster 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded"
        },
        {
          "name": "ADV-2006-3804",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3804"
        },
        {
          "name": "22135",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22135"
        },
        {
          "name": "29306",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29306"
        },
        {
          "name": "22154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22154"
        },
        {
          "name": "22134",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22134"
        },
        {
          "name": "ADV-2006-3812",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3812"
        },
        {
          "name": "20060927 Comdev FAQ Support 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded"
        },
        {
          "name": "ADV-2006-3810",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3810"
        },
        {
          "name": "29308",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29308"
        },
        {
          "name": "22133",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22133"
        },
        {
          "name": "29302",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29302"
        },
        {
          "name": "20060927 Comdev Customer Helpdesk 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded"
        },
        {
          "name": "ADV-2006-3805",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3805"
        },
        {
          "name": "comdev-include-file-include(29220)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220"
        },
        {
          "name": "29301",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29301"
        },
        {
          "name": "ADV-2006-3803",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3803"
        },
        {
          "name": "29299",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29299"
        },
        {
          "name": "20060927 Comdev Links Directory 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded"
        },
        {
          "name": "20060927 Comdev Web Blogger 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded"
        },
        {
          "name": "22151",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22151"
        },
        {
          "name": "ADV-2006-3814",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3814"
        },
        {
          "name": "20060927 Comdev CSV Importer 3.1 :) \u003c= Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded"
        },
        {
          "name": "29309",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/29309"
        },
        {
          "name": "ADV-2006-3815",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3815"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5101",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter.  NOTE: it has been reported that 4.1 versions might also be affected."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-3807",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3807"
            },
            {
              "name": "ADV-2006-3811",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3811"
            },
            {
              "name": "29300",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29300"
            },
            {
              "name": "29310",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29310"
            },
            {
              "name": "20060927 Comdev News Publisher 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded"
            },
            {
              "name": "22147",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22147"
            },
            {
              "name": "22157",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22157"
            },
            {
              "name": "20060927 Comdev Contact Form 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded"
            },
            {
              "name": "20060927 Comdev eCommerce 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded"
            },
            {
              "name": "29303",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29303"
            },
            {
              "name": "ADV-2006-3806",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3806"
            },
            {
              "name": "22153",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22153"
            },
            {
              "name": "22169",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22169"
            },
            {
              "name": "ADV-2006-3809",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3809"
            },
            {
              "name": "ADV-2006-3813",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3813"
            },
            {
              "name": "1658",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1658"
            },
            {
              "name": "29305",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29305"
            },
            {
              "name": "20060927 Comdev Newsletter 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded"
            },
            {
              "name": "29311",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29311"
            },
            {
              "name": "22170",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22170"
            },
            {
              "name": "20060927 Comdev Photo Gallery 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded"
            },
            {
              "name": "29307",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29307"
            },
            {
              "name": "20060927 Comdev Events Calendar 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded"
            },
            {
              "name": "22168",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22168"
            },
            {
              "name": "20060927 Comdev Guestbook 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded"
            },
            {
              "name": "29304",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29304"
            },
            {
              "name": "22149",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22149"
            },
            {
              "name": "ADV-2006-3808",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3808"
            },
            {
              "name": "20060927 Comdev Vote Caster 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded"
            },
            {
              "name": "ADV-2006-3804",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3804"
            },
            {
              "name": "22135",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22135"
            },
            {
              "name": "29306",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29306"
            },
            {
              "name": "22154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22154"
            },
            {
              "name": "22134",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22134"
            },
            {
              "name": "ADV-2006-3812",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3812"
            },
            {
              "name": "20060927 Comdev FAQ Support 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded"
            },
            {
              "name": "ADV-2006-3810",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3810"
            },
            {
              "name": "29308",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29308"
            },
            {
              "name": "22133",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22133"
            },
            {
              "name": "29302",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29302"
            },
            {
              "name": "20060927 Comdev Customer Helpdesk 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded"
            },
            {
              "name": "ADV-2006-3805",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3805"
            },
            {
              "name": "comdev-include-file-include(29220)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220"
            },
            {
              "name": "29301",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29301"
            },
            {
              "name": "ADV-2006-3803",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3803"
            },
            {
              "name": "29299",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29299"
            },
            {
              "name": "20060927 Comdev Links Directory 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded"
            },
            {
              "name": "20060927 Comdev Web Blogger 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded"
            },
            {
              "name": "22151",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22151"
            },
            {
              "name": "ADV-2006-3814",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3814"
            },
            {
              "name": "20060927 Comdev CSV Importer 3.1 :) \u003c= Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded"
            },
            {
              "name": "29309",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/29309"
            },
            {
              "name": "ADV-2006-3815",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3815"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5101",
    "datePublished": "2006-10-02T20:00:00",
    "dateReserved": "2006-10-02T00:00:00",
    "dateUpdated": "2024-08-07T19:41:05.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}