| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.8 | $0-$5k | 0.00 |
Summary
A vulnerability identified as very critical has been detected in DotNetNuke. Affected is an unknown function. This manipulation causes Remote Code Execution. This vulnerability is tracked as CVE-2006-3601. No exploit exists.
Details
A vulnerability was found in DotNetNuke (Content Management System) (affected version not known). It has been declared as very critical. Affected by this vulnerability is some unknown functionality. The manipulation with an unknown input leads to a remote code execution vulnerability. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
** UNVERIFIABLE ** Unspecified vulnerability in an unspecified DNN Modules module for DotNetNuke (.net nuke) allows remote attackers to gain privileges via unspecified vectors, as used in an attack against the Microsoft France web site. NOTE: due to the lack of details and uncertainty about which product is affected, this claim is not independently verifiable.
The weakness was disclosed 07/18/2006 (Website). It is possible to read the advisory at zone-h.org. This vulnerability is known as CVE-2006-3601 since 07/14/2006. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 06/21/2019).
The vulnerability scanner Nessus provides a plugin with the ID 21747 (BDPDT for DotNetNuke (.net nuke) uploadfilepopup.aspx File Upload Privilege Escalation), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CGI abuses and running in the context r.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at Tenable (21747), SecurityFocus (BID 18522†), OSVDB (41851†), SecurityTracker (ID 1016332†) and Vulnerability Center (SBV-12052†). Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.8
VulDB Base Score: 9.8
VulDB Temp Score: 9.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 21747
Nessus Name: BDPDT for DotNetNuke (.net nuke) uploadfilepopup.aspx File Upload Privilege Escalation
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
05/04/2006 🔍06/19/2006 🔍
06/20/2006 🔍
06/23/2006 🔍
06/27/2006 🔍
07/14/2006 🔍
07/18/2006 🔍
07/18/2006 🔍
03/12/2015 🔍
06/21/2019 🔍
Sources
Advisory: zone-h.orgStatus: Not defined
CVE: CVE-2006-3601 (🔍)
GCVE (CVE): GCVE-0-2006-3601
GCVE (VulDB): GCVE-100-31327
SecurityFocus: 18522 - DotNetNuke CVE-2006-3601 Unspecified Security Vulnerability
OSVDB: 41851 - CVE-2006-3601 - DotNetNuke - Unspecified Issue
SecurityTracker: 1016332
Vulnerability Center: 12052 - DotNetNuke With an Add-On Module Using BDPDT Remote Code Execution, High
Entry
Created: 03/12/2015 14:25Updated: 06/21/2019 10:32
Changes: 03/12/2015 14:25 (62), 06/21/2019 10:32 (2)
Complete: 🔍
Cache ID: 216::103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.