ID CVE-2006-6168
Type cve
Reporter cve@mitre.org
Modified 2012-10-24T04:00:00
Description
tiki-register.php in TikiWiki before 1.9.7 allows remote attackers to trigger "notification-spam" via certain vectors such as a comma-separated list of addresses in the email field, related to lack of "a minimal check on email."
{"id": "CVE-2006-6168", "bulletinFamily": "NVD", "title": "CVE-2006-6168", "description": "tiki-register.php in TikiWiki before 1.9.7 allows remote attackers to trigger \"notification-spam\" via certain vectors such as a comma-separated list of addresses in the email field, related to lack of \"a minimal check on email.\"", "published": "2006-11-29T02:28:00", "modified": "2012-10-24T04:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-6168", "reporter": "cve@mitre.org", "references": ["http://www.vupen.com/english/advisories/2006/4709", "http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/tiki-register.php?r1=1.68&r2=1.69", "http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/changelog.txt?r1=1.157.2.50&r2=1.157.2.51"], "cvelist": ["CVE-2006-6168"], "type": "cve", "lastseen": "2020-12-09T19:23:49", "edition": 5, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:32472"]}], "modified": "2020-12-09T19:23:49", "rev": 2}, "score": {"value": 5.5, "vector": "NONE", "modified": "2020-12-09T19:23:49", "rev": 2}, "vulnersScore": 5.5}, "cpe": ["cpe:/a:tiki:tikiwiki_cms\\/groupware:1.9.2", "cpe:/a:tiki:tikiwiki_cms\\/groupware:1.9.6", "cpe:/a:tiki:tikiwiki_cms\\/groupware:1.9.0", "cpe:/a:tiki:tikiwiki_cms\\/groupware:1.9.1", "cpe:/a:tiki:tikiwiki_cms\\/groupware:1.9.4", "cpe:/a:tiki:tikiwiki_cms\\/groupware:1.9.3", "cpe:/a:tiki:tikiwiki_cms\\/groupware:1.6.1", "cpe:/a:tiki:tikiwiki_cms\\/groupware:1.9.5"], "affectedSoftware": [{"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "eq", "version": "1.9.3"}, {"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "eq", "version": "1.9.2"}, {"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "le", "version": "1.9.6"}, {"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "eq", "version": "1.9.0"}, {"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "eq", "version": "1.9.0"}, {"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "eq", "version": "1.9.0"}, {"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "eq", "version": "1.9.0"}, {"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "eq", "version": "1.9.5"}, {"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "eq", "version": "1.6.1"}, {"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "eq", "version": "1.9.1"}, {"cpeName": "tiki:tikiwiki_cms\\/groupware", "name": "tiki tikiwiki cms\\/groupware", "operator": "eq", "version": "1.9.4"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:*:*:*:*:*:*:*"], "cwe": ["CWE-20"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.5:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.6:*:*:*:*:*:*:*", "versionEndIncluding": "1.9.6", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc1:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.6.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc2:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc3:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}}
{"osvdb": [{"lastseen": "2017-04-28T13:20:28", "bulletinFamily": "software", "cvelist": ["CVE-2006-6168"], "description": "## Solution Description\nUpgrade to version 1.9.7 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor URL: http://tikiwiki.org/\nVendor Specific News/Changelog Entry: http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/changelog.txt?r1=1.157.2.50&r2=1.157.2.51\nVendor Specific News/Changelog Entry: http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/tiki-register.php?r1=1.68&r2=1.69\nVendor Specific News/Changelog Entry: http://tikiwiki.org/tiki-index.php?page=ReleaseProcess197&bl\n[Related OSVDB ID: 32473](https://vulners.com/osvdb/OSVDB:32473)\n[Related OSVDB ID: 32471](https://vulners.com/osvdb/OSVDB:32471)\nMail List Post: http://archives.neohapsis.com/archives/apps/freshmeat/2006-12/0003.html\nFrSIRT Advisory: ADV-2006-4709\n[CVE-2006-6168](https://vulners.com/cve/CVE-2006-6168)\n", "edition": 1, "modified": "2006-11-25T04:43:42", "published": "2006-11-25T04:43:42", "href": "https://vulners.com/osvdb/OSVDB:32472", "id": "OSVDB:32472", "title": "TikiWiki tiki-register.php Malformed E-mail Address DoS", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}