ID CVE-2006-0325 Type cve Reporter NVD Modified 2017-07-19T21:29:39
Description
Etomite Content Management System 0.6, and possibly earlier versions, when downloaded from the web site in January 2006 after January 10, contains a back door in manager/includes/todo.inc.php, which allows remote attackers to execute arbitrary commands via the "cij" parameter.
{"id": "CVE-2006-0325", "bulletinFamily": "NVD", "title": "CVE-2006-0325", "description": "Etomite Content Management System 0.6, and possibly earlier versions, when downloaded from the web site in January 2006 after January 10, contains a back door in manager/includes/todo.inc.php, which allows remote attackers to execute arbitrary commands via the \"cij\" parameter.", "published": "2006-01-20T16:03:00", "modified": "2017-07-19T21:29:39", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0325", "reporter": "NVD", "references": ["http://www.securityfocus.com/archive/1/archive/1/423497/100/0/threaded", "http://www.etomite.org/forums/index.php?showtopic=4291", "https://exchange.xforce.ibmcloud.com/vulnerabilities/24254", "http://www.vupen.com/english/advisories/2006/0283", "http://www.lucaercoli.it/advs/etomite.txt", "http://www.securityfocus.com/bid/16336", "http://www.etomite.org/forums/index.php?showtopic=4185", "http://www.securityfocus.com/archive/1/archive/1/423523/100/0/threaded"], "cvelist": ["CVE-2006-0325"], "type": "cve", "lastseen": "2017-07-20T10:49:03", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:etomite:etomite:0.6"], "cvelist": ["CVE-2006-0325"], "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "Etomite Content Management System 0.6, and possibly earlier versions, when downloaded from the web site in January 2006 after January 10, contains a back door in manager/includes/todo.inc.php, which allows remote attackers to execute arbitrary commands via the \"cij\" parameter.", "edition": 1, "enchantments": {}, "hash": "f1a56b8b32dd3f0e08d6018b213781b4230f6f8d6599823c4b87b9378c1bca4e", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "182ae6399eacb49bf81caecdf399df4d", "key": "description"}, {"hash": "f42a28c7d1892885fbc8bfe7d4c07c96", "key": "title"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "d0009b1a5495b136c6a9c4888f11e695", "key": "modified"}, {"hash": "39e38b92105817643d65ebaeff574561", "key": "cpe"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "36bd0d916903ec1b39788296e019fb2c", "key": "cvelist"}, {"hash": "217a9e2e6fc244d7fdd0a341fd60a4b9", "key": "href"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "4f275f2546ccc17c61f26bfa92ccf3a8", "key": "published"}, {"hash": "09762b995388d464bcf5dff6215e11dc", "key": "references"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0325", "id": "CVE-2006-0325", "lastseen": "2016-09-03T06:23:43", "modified": "2011-12-08T00:00:00", "objectVersion": "1.2", "published": "2006-01-20T16:03:00", "references": ["http://www.securityfocus.com/archive/1/archive/1/423497/100/0/threaded", "http://www.etomite.org/forums/index.php?showtopic=4291", "http://xforce.iss.net/xforce/xfdb/24254", "http://www.vupen.com/english/advisories/2006/0283", "http://www.lucaercoli.it/advs/etomite.txt", "http://www.securityfocus.com/bid/16336", "http://www.etomite.org/forums/index.php?showtopic=4185", "http://www.securityfocus.com/archive/1/archive/1/423523/100/0/threaded"], "reporter": "NVD", "scanner": [], "title": "CVE-2006-0325", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T06:23:43"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "39e38b92105817643d65ebaeff574561"}, {"key": "cvelist", "hash": "36bd0d916903ec1b39788296e019fb2c"}, {"key": "cvss", "hash": "e5d275b3ebd62646b78320753699e02e"}, {"key": "description", "hash": "182ae6399eacb49bf81caecdf399df4d"}, {"key": "href", "hash": "217a9e2e6fc244d7fdd0a341fd60a4b9"}, {"key": "modified", "hash": "6d1a86511f12fdbaec986cc4504a7d4a"}, {"key": "published", "hash": "4f275f2546ccc17c61f26bfa92ccf3a8"}, {"key": "references", "hash": "44b18ae31bf7207850a598f8e94223d5"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "f42a28c7d1892885fbc8bfe7d4c07c96"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "2f00d599ce5f9b91af3727765a274a4330b345f640f1365d18c07358ce714f38", "viewCount": 0, "enchantments": {"vulnersScore": 8.3}, "objectVersion": "1.3", "cpe": ["cpe:/a:etomite:etomite:0.6"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"result": {"osvdb": [{"id": "OSVDB:22693", "type": "osvdb", "title": "Etomite todo.inc.php cij Variable Arbitrary Command Execution", "description": "## Vulnerability Description\nEtomite Content Management System contains a default backdoor in the 'todo.inc.php' script. A remote attacker could exploit this vulnerability by sending a specially-crafted URL to the todo.inc.php script that uses the 'cij' parameter to pass malicious code to the popen() function, allowing the attacker to execute commands on the system. While the command output is mailed to a hardcoded email address, the commands are still executed.\n## Solution Description\nUpgrade to version 0.6.1 (beta) or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nEtomite Content Management System contains a default backdoor in the 'todo.inc.php' script. A remote attacker could exploit this vulnerability by sending a specially-crafted URL to the todo.inc.php script that uses the 'cij' parameter to pass malicious code to the popen() function, allowing the attacker to execute commands on the system. While the command output is mailed to a hardcoded email address, the commands are still executed.\n## References:\nVendor URL: http://www.etomite.org/\nVendor Specific News/Changelog Entry: http://www.etomite.org/forums/index.php?showtopic=4185\n[Secunia Advisory ID:18556](https://secuniaresearch.flexerasoftware.com/advisories/18556/)\nOther Advisory URL: http://www.lucaercoli.it/advs/etomite.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-01/0497.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-01/0505.html\nISS X-Force ID: 24254\n[CVE-2006-0325](https://vulners.com/cve/CVE-2006-0325)\n", "published": "2006-01-19T08:32:33", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:22693", "cvelist": ["CVE-2006-0325"], "lastseen": "2017-04-28T13:20:19"}]}}