CVE-2006-6168 (GCVE-0-2006-6168)
Vulnerability from cvelistv5
Published
2006-11-29 02:00
Modified
2024-08-07 20:19
Severity ?
CWE
  • n/a
Summary
tiki-register.php in TikiWiki before 1.9.7 allows remote attackers to trigger "notification-spam" via certain vectors such as a comma-separated list of addresses in the email field, related to lack of "a minimal check on email."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:19:35.191Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/changelog.txt?r1=1.157.2.50\u0026r2=1.157.2.51"
          },
          {
            "name": "ADV-2006-4709",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4709"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/tiki-register.php?r1=1.68\u0026r2=1.69"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "tiki-register.php in TikiWiki before 1.9.7 allows remote attackers to trigger \"notification-spam\" via certain vectors such as a comma-separated list of addresses in the email field, related to lack of \"a minimal check on email.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/changelog.txt?r1=1.157.2.50\u0026r2=1.157.2.51"
        },
        {
          "name": "ADV-2006-4709",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4709"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/tiki-register.php?r1=1.68\u0026r2=1.69"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6168",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "tiki-register.php in TikiWiki before 1.9.7 allows remote attackers to trigger \"notification-spam\" via certain vectors such as a comma-separated list of addresses in the email field, related to lack of \"a minimal check on email.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/changelog.txt?r1=1.157.2.50\u0026r2=1.157.2.51",
              "refsource": "CONFIRM",
              "url": "http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/changelog.txt?r1=1.157.2.50\u0026r2=1.157.2.51"
            },
            {
              "name": "ADV-2006-4709",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4709"
            },
            {
              "name": "http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/tiki-register.php?r1=1.68\u0026r2=1.69",
              "refsource": "CONFIRM",
              "url": "http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/tiki-register.php?r1=1.68\u0026r2=1.69"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6168",
    "datePublished": "2006-11-29T02:00:00",
    "dateReserved": "2006-11-28T00:00:00",
    "dateUpdated": "2024-08-07T20:19:35.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2006-6168\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-11-29T02:28:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"tiki-register.php in TikiWiki before 1.9.7 allows remote attackers to trigger \\\"notification-spam\\\" via certain vectors such as a comma-separated list of addresses in the email field, related to lack of \\\"a minimal check on email.\\\"\"},{\"lang\":\"es\",\"value\":\"tiki-register.php en TikiWiki anterior a 1.9.7 permite a atacantes remotos disparar \\\"notificaci\u00f3n de spam\\\" mediante vectores no especificados como una lista de direcciones separadas por coma en el campo email, relacionado con la falta de \\\"un  m\u00ednimo chequeo en email\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.9.6\",\"matchCriteriaId\":\"255A9708-AA35-458B-8521-735D2AF7A637\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04CA9500-8F56-40DC-A6C4-F9964EFCD4F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:1.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13501C0-3322-4D0C-8F7F-12535C76CB69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:1.9.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB63DA4-E9B5-4BDF-A4E5-54F4EE4E94AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:1.9.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADE04A29-E90B-41E1-A8B4-462B54C079B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:1.9.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2540703B-63B8-41F4-A17A-0274A7DE7E63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:1.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1489E8DC-11E7-49A3-84FF-909954147D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:1.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"035EEFAB-B46C-407F-BF8C-B33756D4EEC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:1.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"127349FA-B76D-402A-B688-F2F44024FA11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:1.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"175D43FD-450F-443E-831B-B8091BE7054F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tiki:tikiwiki_cms\\\\/groupware:1.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F437662-CD55-477B-9FEE-0CC4E6CB908D\"}]}]}],\"references\":[{\"url\":\"http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/changelog.txt?r1=1.157.2.50\u0026r2=1.157.2.51\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/tiki-register.php?r1=1.68\u0026r2=1.69\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4709\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/changelog.txt?r1=1.157.2.50\u0026r2=1.157.2.51\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/tiki-register.php?r1=1.68\u0026r2=1.69\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4709\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…