Vulnerability Details : CVE-2006-3102
Race condition in articles/BitArticle.php in Bitweaver 1.3, when run on Apache with the mod_mime extension, allows remote attackers to execute arbitrary PHP code by uploading arbitrary files with double extensions, which are stored for a small period of time under the webroot in the temp/articles directory.
Exploit prediction scoring system (EPSS) score for CVE-2006-3102
Probability of exploitation activity in the next 30 days: 8.16%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3102
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2006-3102
- http://www.securityfocus.com/archive/1/437491/100/0/threaded
-
http://retrogod.altervista.org/bitweaver_13_xpl.html
Exploit
- http://www.bitweaver.org/articles/45
- http://sourceforge.net/project/shownotes.php?release_id=336854&group_id=141358
- http://securityreason.com/securityalert/1115
-
https://www.exploit-db.com/exploits/1918
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27215
- http://www.vupen.com/english/advisories/2006/2405
Products affected by CVE-2006-3102
- cpe:2.3:a:bitweaver:bitweaver:1.3:*:*:*:*:*:*:*