CVE-2006-5101
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Current Description
PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: it has been reported that 4.1 versions might also be affected.
View Analysis Description
Analysis
Description
PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path["docroot"] parameter.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://secunia.com/advisories/22133
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22134
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22135
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22147
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22149
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22151
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22153
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22154
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22157
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22168
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22169
CVE, MITRE
Vendor Advisory
http://secunia.com/advisories/22170
CVE, MITRE
Vendor Advisory
http://securityreason.com/securityalert/1658
CVE, MITRE
http://www.osvdb.org/29299
CVE, MITRE
http://www.osvdb.org/29300
CVE, MITRE
http://www.osvdb.org/29301
CVE, MITRE
http://www.osvdb.org/29302
CVE, MITRE
http://www.osvdb.org/29303
CVE, MITRE
http://www.osvdb.org/29304
CVE, MITRE
http://www.osvdb.org/29305
CVE, MITRE
http://www.osvdb.org/29306
CVE, MITRE
http://www.osvdb.org/29307
CVE, MITRE
http://www.osvdb.org/29308
CVE, MITRE
http://www.osvdb.org/29309
CVE, MITRE
http://www.osvdb.org/29310
CVE, MITRE
http://www.osvdb.org/29311
CVE, MITRE
http://www.securityfocus.com/archive/1/447184/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447185/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447186/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447187/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447188/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447190/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447192/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447193/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447194/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447201/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447207/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447209/100/0/threaded
CVE, MITRE
http://www.securityfocus.com/archive/1/447213/100/0/threaded
CVE, MITRE
http://www.vupen.com/english/advisories/2006/3803
CVE, MITRE
http://www.vupen.com/english/advisories/2006/3804
CVE, MITRE
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3805
CVE, MITRE
http://www.vupen.com/english/advisories/2006/3806
CVE, MITRE
http://www.vupen.com/english/advisories/2006/3807
CVE, MITRE
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3808
CVE, MITRE
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3809
CVE, MITRE
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3810
CVE, MITRE
http://www.vupen.com/english/advisories/2006/3811
CVE, MITRE
http://www.vupen.com/english/advisories/2006/3812
CVE, MITRE
http://www.vupen.com/english/advisories/2006/3813
CVE, MITRE
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3814
CVE, MITRE
http://www.vupen.com/english/advisories/2006/3815
CVE, MITRE
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/29220
CVE, MITRE
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-94
Improper Control of Generation of Code ('Code Injection')
NIST  
Change History
5 change records found show changes
CVE Modified by CVE 11/20/2024 7:17:52 PM
Action
Type
Old Value
New Value
Added
Reference
http://secunia.com/advisories/22133
Added
Reference
http://secunia.com/advisories/22134
Added
Reference
http://secunia.com/advisories/22135
Added
Reference
http://secunia.com/advisories/22147
Added
Reference
http://secunia.com/advisories/22149
Added
Reference
http://secunia.com/advisories/22151
Added
Reference
http://secunia.com/advisories/22153
Added
Reference
http://secunia.com/advisories/22154
Added
Reference
http://secunia.com/advisories/22157
Added
Reference
http://secunia.com/advisories/22168
Added
Reference
http://secunia.com/advisories/22169
Added
Reference
http://secunia.com/advisories/22170
Added
Reference
http://securityreason.com/securityalert/1658
Added
Reference
http://www.osvdb.org/29299
Added
Reference
http://www.osvdb.org/29300
Added
Reference
http://www.osvdb.org/29301
Added
Reference
http://www.osvdb.org/29302
Added
Reference
http://www.osvdb.org/29303
Added
Reference
http://www.osvdb.org/29304
Added
Reference
http://www.osvdb.org/29305
Added
Reference
http://www.osvdb.org/29306
Added
Reference
http://www.osvdb.org/29307
Added
Reference
http://www.osvdb.org/29308
Added
Reference
http://www.osvdb.org/29309
Added
Reference
http://www.osvdb.org/29310
Added
Reference
http://www.osvdb.org/29311
Added
Reference
http://www.securityfocus.com/archive/1/447184/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447185/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447186/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447187/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447188/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447190/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447192/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447193/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447194/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447201/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447207/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447209/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/447213/100/0/threaded
Added
Reference
http://www.vupen.com/english/advisories/2006/3803
Added
Reference
http://www.vupen.com/english/advisories/2006/3804
Added
Reference
http://www.vupen.com/english/advisories/2006/3805
Added
Reference
http://www.vupen.com/english/advisories/2006/3806
Added
Reference
http://www.vupen.com/english/advisories/2006/3807
Added
Reference
http://www.vupen.com/english/advisories/2006/3808
Added
Reference
http://www.vupen.com/english/advisories/2006/3809
Added
Reference
http://www.vupen.com/english/advisories/2006/3810
Added
Reference
http://www.vupen.com/english/advisories/2006/3811
Added
Reference
http://www.vupen.com/english/advisories/2006/3812
Added
Reference
http://www.vupen.com/english/advisories/2006/3813
Added
Reference
http://www.vupen.com/english/advisories/2006/3814
Added
Reference
http://www.vupen.com/english/advisories/2006/3815
Added
Reference
https://exchange.xforce.ibmcloud.com/vulnerabilities/29220
CVE Modified by MITRE 5/13/2024 9:39:49 PM
Action
Type
Old Value
New Value
CVE Modified by MITRE 10/17/2018 5:41:06 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/archive/1/447184/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447185/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447186/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447187/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447188/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447190/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447192/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447193/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447194/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447201/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447207/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447209/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/447213/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447184/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447185/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447186/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447187/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447188/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447190/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447192/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447193/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447194/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447201/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447207/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447209/100/0/threaded [Exploit]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/447213/100/0/threaded [Exploit]
CVE Modified by MITRE 7/19/2017 9:33:31 PM
Action
Type
Old Value
New Value
Added
Reference
https://exchange.xforce.ibmcloud.com/vulnerabilities/29220 [No Types Assigned]
Removed
Reference
http://xforce.iss.net/xforce/xfdb/29220 [No Types Assigned]
Initial CVE Analysis 10/03/2006 10:27:00 AM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2006-5101 NVD
Published Date: 10/03/2006 NVD
Last Modified: 04/08/2025
Source: MITRE