FKIE_CVE-2006-3830
Vulnerability from fkie_nvd - Published: 2006-07-25 13:22 - Updated: 2025-04-03 01:03
Severity ?
Summary
The Languages selection in the admin interface in Kailash Nadh boastMachine (formerly bMachine) 3.1 and earlier allows remote authenticated administrators to upload files with arbitrary extensions to the bmc/Inc/Lang directory. NOTE: because the uploaded files cannot be accessed through HTTP, this issue is a vulnerability only if there is a likely usage pattern in which the files would be opened or executed by local users, e.g., malware files with names that entice local users to open the files.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| kailash_nadh | boastmachine | 2.5 | |
| kailash_nadh | boastmachine | 2.7 | |
| kailash_nadh | boastmachine | 2.8 | |
| kailash_nadh | boastmachine | 2.9b | |
| kailash_nadh | boastmachine | 3.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kailash_nadh:boastmachine:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B19759CD-3F3D-4A96-8DD0-828BA628427D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kailash_nadh:boastmachine:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD75997-6BFC-4161-A12A-8AB03FBDB562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kailash_nadh:boastmachine:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3AC1D5AE-1D9C-416A-8A34-61931C810478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kailash_nadh:boastmachine:2.9b:*:*:*:*:*:*:*",
"matchCriteriaId": "73D3FA6A-5221-4607-961F-075A78EC6BEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kailash_nadh:boastmachine:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "621CCF40-F2DD-4F07-9F8B-37053AB04293",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Languages selection in the admin interface in Kailash Nadh boastMachine (formerly bMachine) 3.1 and earlier allows remote authenticated administrators to upload files with arbitrary extensions to the bmc/Inc/Lang directory. NOTE: because the uploaded files cannot be accessed through HTTP, this issue is a vulnerability only if there is a likely usage pattern in which the files would be opened or executed by local users, e.g., malware files with names that entice local users to open the files."
},
{
"lang": "es",
"value": "La selecci\u00f3n de Idioma en la interfaz admin en Kailash Nadh boastMachine (formalmente bMachine) 3.1 y anteriores permite a administradores remotos validados actualizar archivos con extensiones de su elecci\u00f3n en el directorio bmc/Inc/Lang. NOTA: Dado que la actualizaci\u00f3n de archivos no puede ser accedida desde HTTP, este asunto es una vulnerabilidad solo si hay un patr\u00f3n probable de uso en el cual los archivos fueran abiertos o ejecutados por los usuarios locales, e.g., archivos de malware con nombres que tientan a usuarios locales a abrir esos archivos."
}
],
"id": "CVE-2006-3830",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-07-25T13:22:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21066"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.acid-root.new.fr/advisories/boastmachine.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21066"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.acid-root.new.fr/advisories/boastmachine.txt"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…