CVE-2006-5258

Current Description

The spell checking component of (1) Asbru Web Content Management before 6.1.22, (2) Asbru Web Content Editor before 6.0.22, and (3) Asbru Website Manager before 6.0.22 allows remote attackers to execute arbitrary commands via an unspecified parameter that is not sanitized before Aspell is invoked.

Basic Data

PublishedOctober 12, 2006
Last ModifiedJune 13, 2011
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-94
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.1
SeverityMEDIUM
Exploitability Score4.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegetrue
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationAsbru SoftwareAsbru Web Content Management6.0*******
    2.3ApplicationAsbru SoftwareAsbru Web Content Management6.0.17*******
    2.3ApplicationAsbru SoftwareAsbru Web Content Management6.1*******
    2.3ApplicationAsbru SoftwareAsbru Web Content Management6.1.19*******
    2.3ApplicationAsbru SoftwareAsbru Web Content Management********6.1.20
    2.3ApplicationAsbru SoftwareAsbru Website Manager6.0.20*******

Vulnerable Software List

VendorProductVersions
Asbru Software Asbru Web Content Management *, 6.0, 6.0.17, 6.1, 6.1.19
Asbru Software Asbru Website Manager 6.0.20

References

NameSourceURLTags
20061016 Asbru HardCore Web Content Editor - Command Injectionhttp://archives.neohapsis.com/archives/fulldisclosure/2006-10/0306.htmlFULLDISC
http://editor.asbrusoft.com/page.php/id=727http://editor.asbrusoft.com/page.php/id=727CONFIRM
22344http://secunia.com/advisories/22344SECUNIAPatch Vendor Advisory
22353http://secunia.com/advisories/22353SECUNIA
22472http://secunia.com/advisories/22472SECUNIAVendor Advisory
http://wcm.asbrusoft.com/page.php/id=791http://wcm.asbrusoft.com/page.php/id=791CONFIRMPatch
20544http://www.securityfocus.com/bid/20544BID
ADV-2006-4004http://www.vupen.com/english/advisories/2006/4004VUPENVendor Advisory
ADV-2006-4060http://www.vupen.com/english/advisories/2006/4060VUPENVendor Advisory
ADV-2006-4061http://www.vupen.com/english/advisories/2006/4061VUPENVendor Advisory