CRE Loaded における権限のあるアクションを実行される脆弱性
| Title |
CRE Loaded における権限のあるアクションを実行される脆弱性
|
| Summary |
CRE Loaded には、権限のあるアクションを実行される脆弱性が存在します。
|
| Possible impacts |
第三者により、権限のあるアクションを実行される可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
Jan. 31, 2006, midnight |
| Registration Date |
March 11, 2014, 5:43 p.m. |
| Last Update |
March 11, 2014, 5:43 p.m. |
|
CVSS2.0 : 危険
|
| Score |
7.5
|
| Vector |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
Affected System
| creloaded |
|
cre loaded 6.15
|
CVE (情報セキュリティ 共通脆弱性識別子)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2014年03月11日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2006-0478
| Summary |
CRE Loaded 6.15 allows remote attackers to perform privileged actions, including uploading and creating arbitrary files, via a direct request to files.php. NOTE: the vendor states "The initial announcement of this risk was made on our website... and it included a patch which will close the vulnerability on all known 6.0x and 6.1x releases. We strongly encourage users of CRE Loaded 6.x, osCMax, and other users of osCommerce who have installed HTMLArea based WYSIWYG editors and Admin Access with Levels to modify thier installations at the earliest possible moment."
|
| Publication Date |
Jan. 31, 2006, 8:03 p.m. |
| Registration Date |
Jan. 29, 2021, 3:30 p.m. |
| Last Update |
July 20, 2017, 10:29 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:cre_loaded:cre_loaded:6.15:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List