CVE-2006-3990 (CNNVD-200608-064)

HIGH 有利用代码
中文标题:
Paul M. Jones Savant2 多个PHP远程文件包含漏洞
英文标题:
Multiple PHP remote file inclusion vulnerabilities in Paul M. Jones Savant2, possibly when used with...
CVSS分数: 7.5
发布时间: 2006-08-05 00:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v5
漏洞描述
中文描述:

Paul M. Jones Savant2存在多个PHP远程文件包含漏洞,可能在与Mambo和Joomla软件的com_mtree组件一起使用时,远程攻击者可借助以下脚本的mosConfig_absolute_path参数中的URL执行任意PHP代码:(1) Savant2_Plugin_stylesheet.php, (2) Savant2_Compiler_basic.php, (3) Savant2_Error_pear.php, (4) Savant2_Error_stack.php, (5) Savant2_Filter_colorizeCode.php, (6) Savant2_Filter_trimwhitespace.php, (7) Savant2_Plugin_ahref.php, (8) Savant2_Plugin_ahrefcontact.php, (9) Savant2_Plugin_ahreflisting.php, (10) Savant2_Plugin_ahreflistingimage.php, (11) Savant2_Plugin_ahrefmap.php, (12) Savant2_Plugin_ahrefownerlisting.php, (13) Savant2_Plugin_ahrefprint.php, (14) Savant2_Plugin_ahrefrating.php, (15) Savant2_Plugin_ahrefrecommend.php, (16) Savant2_Plugin_ahrefreport.php, (17) Savant2_Plugin_ahrefreview.php, (18) Savant2_Plugin_ahrefvisit.php, (19) Savant2_Plugin_checkbox.php, (20) Savant2_Plugin_cycle.php, (21) Savant2_Plugin_dateformat.php, (22) Savant2_Plugin_editor.php, (23) Savant2_Plugin_form.php, (24) Savant2_Plugin_image.php, (25) Savant2_Plugin_input.php, (26) Savant2_Plugin_javascript.php, (27) Savant2_Plugin_listalpha.php, (28) Savant2_Plugin_listingname.php, (29) Savant2_Plugin_modify.php, (30) Savant2_Plugin_mtpath.php, (31) Savant2_Plugin_options.php, (32) Savant2_Plugin_radios.php, (33) Savant2_Plugin_rating.php, 或 (34) Savant2_Plugin_textarea.php。

英文描述:

Multiple PHP remote file inclusion vulnerabilities in Paul M. Jones Savant2, possibly when used with the com_mtree component for Mambo and Joomla!, allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) Savant2_Plugin_stylesheet.php, (2) Savant2_Compiler_basic.php, (3) Savant2_Error_pear.php, (4) Savant2_Error_stack.php, (5) Savant2_Filter_colorizeCode.php, (6) Savant2_Filter_trimwhitespace.php, (7) Savant2_Plugin_ahref.php, (8) Savant2_Plugin_ahrefcontact.php, (9) Savant2_Plugin_ahreflisting.php, (10) Savant2_Plugin_ahreflistingimage.php, (11) Savant2_Plugin_ahrefmap.php, (12) Savant2_Plugin_ahrefownerlisting.php, (13) Savant2_Plugin_ahrefprint.php, (14) Savant2_Plugin_ahrefrating.php, (15) Savant2_Plugin_ahrefrecommend.php, (16) Savant2_Plugin_ahrefreport.php, (17) Savant2_Plugin_ahrefreview.php, (18) Savant2_Plugin_ahrefvisit.php, (19) Savant2_Plugin_checkbox.php, (20) Savant2_Plugin_cycle.php, (21) Savant2_Plugin_dateformat.php, (22) Savant2_Plugin_editor.php, (23) Savant2_Plugin_form.php, (24) Savant2_Plugin_image.php, (25) Savant2_Plugin_input.php, (26) Savant2_Plugin_javascript.php, (27) Savant2_Plugin_listalpha.php, (28) Savant2_Plugin_listingname.php, (29) Savant2_Plugin_modify.php, (30) Savant2_Plugin_mtpath.php, (31) Savant2_Plugin_options.php, (32) Savant2_Plugin_radios.php, (33) Savant2_Plugin_rating.php, or (34) Savant2_Plugin_textarea.php.

CWE类型:
(暂无数据)
标签:
webapps php Crackers_Child OSVDB-28712 botan OSVDB-28711
受影响产品
厂商 产品 版本 版本范围 平台 CPE
phpsavant savant2 * - - cpe:2.3:a:phpsavant:savant2:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
28692 vdb-entry
cve.org
访问
28682 vdb-entry
cve.org
访问
28691 vdb-entry
cve.org
访问
1016560 vdb-entry
cve.org
访问
28706 vdb-entry
cve.org
访问
28700 vdb-entry
cve.org
访问
28690 vdb-entry
cve.org
访问
28693 vdb-entry
cve.org
访问
28704 vdb-entry
cve.org
访问
1324 third-party-advisory
cve.org
访问
28679 vdb-entry
cve.org
访问
28699 vdb-entry
cve.org
访问
28686 vdb-entry
cve.org
访问
28709 vdb-entry
cve.org
访问
28698 vdb-entry
cve.org
访问
28696 vdb-entry
cve.org
访问
28697 vdb-entry
cve.org
访问
28703 vdb-entry
cve.org
访问
28702 vdb-entry
cve.org
访问
20060721 [Kurdish Security # 13] Savant2 Remote File Include Vulnerability [For Mambo, Joomla] mailing-list
cve.org
访问
28710 vdb-entry
cve.org
访问
28681 vdb-entry
cve.org
访问
28689 vdb-entry
cve.org
访问
28712 vdb-entry
cve.org
访问
19151 vdb-entry
cve.org
访问
28708 vdb-entry
cve.org
访问
28683 vdb-entry
cve.org
访问
28684 vdb-entry
cve.org
访问
28688 vdb-entry
cve.org
访问
28685 vdb-entry
cve.org
访问
28711 vdb-entry
cve.org
访问
28687 vdb-entry
cve.org
访问
28707 vdb-entry
cve.org
访问
savant-multiple-plugin-file-include(27906) vdb-entry
cve.org
访问
28701 vdb-entry
cve.org
访问
28695 vdb-entry
cve.org
访问
28680 vdb-entry
cve.org
访问
28705 vdb-entry
cve.org
访问
28694 vdb-entry
cve.org
访问
ExploitDB EDB-2205 EXPLOIT
exploitdb
访问
Download Exploit EDB-2205 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2006-3990 ADVISORY
cve.org
访问
ExploitDB EDB-28273 EXPLOIT
exploitdb
访问
Download Exploit EDB-28273 EXPLOIT
exploitdb
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2006-08-05 00:00:00
修改时间:
2024-08-07 18:48:39
创建时间:
2025-11-11 15:32:36
更新时间:
2026-01-19 09:42:13
利用信息
此漏洞有可利用代码!
利用代码数量: 2
利用来源:
未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2006-3990 2025-11-11 15:17:44 2025-11-11 07:32:36
NVD nvd_CVE-2006-3990 2025-11-11 14:51:50 2025-11-11 07:41:21
CNNVD cnnvd_CNNVD-200608-064 2025-11-11 15:08:52 2025-11-11 07:49:09
EXPLOITDB exploitdb_EDB-2205 2025-11-11 15:05:37 2025-11-11 08:16:44
EXPLOITDB exploitdb_EDB-28273 2025-11-11 15:05:41 2025-11-11 08:24:04
版本与语言
当前版本: v5
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v5 EXPLOITDB
2025-11-11 16:24:04
references_count: 42 → 44; tags_count: 4 → 6
查看详细变更
  • references_count: 42 -> 44
  • tags_count: 4 -> 6
v4 EXPLOITDB
2025-11-11 16:16:44
references_count: 39 → 42; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 39 -> 42
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:09
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200608-064; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200608-064
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:21
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 1; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 1
  • data_sources: ['cve'] -> ['cve', 'nvd']