ID CVE-2006-3070
Summary write_ok.php in Zeroboard 4.1 pl8, when installed on Apache with mod_mime, allows remote attackers to bypass restrictions for uploading files with executable extensions by uploading a .htaccess file that with an AddType directive that assigns an executable module to files with assumed-safe extensions, as demonstrated by assigning the txt extension to be handled by application/x-httpd-php.
References
Vulnerable Configurations
  • cpe:2.3:a:zeroboard:zeroboard:4.1_pl8:*:*:*:*:*:*:*
    cpe:2.3:a:zeroboard:zeroboard:4.1_pl8:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-10-2018 - 16:45)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bid 18465
bugtraq 20060616 Zeroboard File Upload & extension bypass Vulnerability
fulldisc 20060616 Zeroboard File Upload & extension bypass Vulnerability
misc http://securecast.wins21.com/zerovul.html
secunia 20592
vupen ADV-2006-2318
xf zeroboard-htaccess-file-upload-(27038)
Last major update 18-10-2018 - 16:45
Published 19-06-2006 - 10:02
Last modified 18-10-2018 - 16:45
Back to Top