{ "schema_version": "1.4.0", "id": "GHSA-qmg3-7x6p-p6c6", "modified": "2022-05-01T07:24:59Z", "published": "2022-05-01T07:24:59Z", "aliases": [ "CVE-2006-5101" ], "details": "PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: it has been reported that 4.1 versions might also be affected.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5101" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29220" }, { "type": "WEB", "url": "http://secunia.com/advisories/22133" }, { "type": "WEB", "url": "http://secunia.com/advisories/22134" }, { "type": "WEB", "url": "http://secunia.com/advisories/22135" }, { "type": "WEB", "url": "http://secunia.com/advisories/22147" }, { "type": "WEB", "url": "http://secunia.com/advisories/22149" }, { "type": "WEB", "url": "http://secunia.com/advisories/22151" }, { "type": "WEB", "url": "http://secunia.com/advisories/22153" }, { "type": "WEB", "url": "http://secunia.com/advisories/22154" }, { "type": "WEB", "url": "http://secunia.com/advisories/22157" }, { "type": "WEB", "url": "http://secunia.com/advisories/22168" }, { "type": "WEB", "url": "http://secunia.com/advisories/22169" }, { "type": "WEB", "url": "http://secunia.com/advisories/22170" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/1658" }, { "type": "WEB", "url": "http://www.osvdb.org/29299" }, { "type": "WEB", "url": "http://www.osvdb.org/29300" }, { "type": "WEB", "url": "http://www.osvdb.org/29301" }, { "type": "WEB", "url": "http://www.osvdb.org/29302" }, { "type": "WEB", "url": "http://www.osvdb.org/29303" }, { "type": "WEB", "url": "http://www.osvdb.org/29304" }, { "type": "WEB", "url": "http://www.osvdb.org/29305" }, { "type": "WEB", "url": "http://www.osvdb.org/29306" }, { "type": "WEB", "url": "http://www.osvdb.org/29307" }, { "type": "WEB", "url": "http://www.osvdb.org/29308" }, { "type": "WEB", "url": "http://www.osvdb.org/29309" }, { "type": "WEB", "url": "http://www.osvdb.org/29310" }, { "type": "WEB", "url": "http://www.osvdb.org/29311" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447184/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447185/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447186/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447187/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447188/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447190/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447192/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447193/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447194/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447201/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447207/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447209/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447213/100/0/threaded" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3803" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3804" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3805" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3806" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3807" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3808" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3809" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3810" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3811" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3812" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3813" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3814" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3815" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-10-03T04:03:00Z" } }