CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.8 | $0-$5k | 0.00 |
A vulnerability has been found in phpBB 2.0.21 (Forum Software) and classified as problematic. This vulnerability affects an unknown code. The manipulation of the argument avatar_path
with an unknown input leads to a privilege escalation vulnerability. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
phpBB 2.0.21 does not properly handle pathnames ending in %00, which allows remote authenticated administrative users to upload arbitrary files, as demonstrated by a query to admin/admin_board.php with an avatar_path parameter ending in .php%00.
The bug was discovered 09/11/2006. The weakness was published 09/13/2006 (Website). The advisory is shared for download at xforce.iss.net. This vulnerability was named CVE-2006-4758 since 09/13/2006. The exploitation appears to be difficult. The attack can be initiated remotely. A single authentication is needed for exploitation. There are known technical details, but no exploit is available.
The vulnerability was handled as a non-public zero-day exploit for at least 2 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 22502 (FreeBSD : phpbb -- NULL byte injection vulnerability (86526ba4-53c8-11db-8f1a-000a48049292)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family FreeBSD Local Security Checks and running in the context l.
Upgrading eliminates this vulnerability. A possible mitigation has been published 3 weeks after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (28884) and Tenable (22502). Similar entries are available at 32261, 34146, 34145 and 34144.
Product
Type
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.0VulDB Meta Temp Score: 4.8
VulDB Base Score: 5.0
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Privilege EscalationCWE: Unknown
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 22502
Nessus Name: FreeBSD : phpbb -- NULL byte injection vulnerability (86526ba4-53c8-11db-8f1a-000a48049292)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
OpenVAS ID: 60361
OpenVAS Name: Debian Security Advisory DSA 1488-1 (phpbb2)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Timeline
09/11/2006 🔍09/11/2006 🔍
09/13/2006 🔍
09/13/2006 🔍
09/13/2006 🔍
10/04/2006 🔍
10/05/2006 🔍
10/10/2006 🔍
12/28/2006 🔍
03/12/2015 🔍
07/09/2019 🔍
Sources
Product: phpbb.comAdvisory: xforce.iss.net
Status: Not defined
Confirmation: 🔍
CVE: CVE-2006-4758 (🔍)
OVAL: 🔍
X-Force: 28884
Vulnerability Center: 12865 - phpBB Error in Handling of Directory Pathnames Ending in %00, Medium
SecurityFocus: 21806 - PHPBB Multiple Input Validation Vulnerabilities
Secunia: 22188
OSVDB: 29493 - phpBB NULL byte file upload
See also: 🔍
Entry
Created: 03/12/2015 15:51Updated: 07/09/2019 08:42
Changes: 03/12/2015 15:51 (71), 07/09/2019 08:42 (8)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.