CVE-2006-3990

Public Exploit

Description

Multiple PHP remote file inclusion vulnerabilities in Paul M. Jones Savant2, possibly when used with the com_mtree component for Mambo and Joomla!, allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) Savant2_Plugin_stylesheet.php, (2) Savant2_Compiler_basic.php, (3) Savant2_Error_pear.php, (4) Savant2_Error_stack.php, (5) Savant2_Filter_colorizeCode.php, (6) Savant2_Filter_trimwhitespace.php, (7) Savant2_Plugin_ahref.php, (8) Savant2_Plugin_ahrefcontact.php, (9) Savant2_Plugin_ahreflisting.php, (10) Savant2_Plugin_ahreflistingimage.php, (11) Savant2_Plugin_ahrefmap.php, (12) Savant2_Plugin_ahrefownerlisting.php, (13) Savant2_Plugin_ahrefprint.php, (14) Savant2_Plugin_ahrefrating.php, (15) Savant2_Plugin_ahrefrecommend.php, (16) Savant2_Plugin_ahrefreport.php, (17) Savant2_Plugin_ahrefreview.php, (18) Savant2_Plugin_ahrefvisit.php, (19) Savant2_Plugin_checkbox.php, (20) Savant2_Plugin_cycle.php, (21) Savant2_Plugin_dateformat.php, (22) Savant2_Plugin_editor.php, (23) Savant2_Plugin_form.php, (24) Savant2_Plugin_image.php, (25) Savant2_Plugin_input.php, (26) Savant2_Plugin_javascript.php, (27) Savant2_Plugin_listalpha.php, (28) Savant2_Plugin_listingname.php, (29) Savant2_Plugin_modify.php, (30) Savant2_Plugin_mtpath.php, (31) Savant2_Plugin_options.php, (32) Savant2_Plugin_radios.php, (33) Savant2_Plugin_rating.php, or (34) Savant2_Plugin_textarea.php.

7.5
CVSS
Severity: High
CVSS 2.0 •
EPSS 9.10% Top 10%
Third-Party Advisory securityreason.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.osvdb.org/28692 vdb entry
http://www.osvdb.org/28682 vdb entry
http://www.osvdb.org/28691 vdb entry
http://securitytracker.com/id?1016560 vdb entry exploit
http://www.osvdb.org/28706 vdb entry
http://www.osvdb.org/28700 vdb entry
http://www.osvdb.org/28690 vdb entry
http://www.osvdb.org/28693 vdb entry
http://www.osvdb.org/28704 vdb entry
http://securityreason.com/securityalert/1324 third party advisory
http://www.osvdb.org/28679 vdb entry
http://www.osvdb.org/28699 vdb entry
http://www.osvdb.org/28686 vdb entry
http://www.osvdb.org/28709 vdb entry
http://www.osvdb.org/28698 vdb entry
http://www.osvdb.org/28696 vdb entry
http://www.osvdb.org/28697 vdb entry
http://www.osvdb.org/28703 vdb entry
http://www.osvdb.org/28702 vdb entry
http://www.securityfocus.com/archive/1/440835/100/200/threaded mailing list
http://www.osvdb.org/28710 vdb entry
http://www.osvdb.org/28681 vdb entry
http://www.osvdb.org/28689 vdb entry
http://www.osvdb.org/28712 vdb entry
http://www.securityfocus.com/bid/19151 vdb entry exploit
http://www.osvdb.org/28708 vdb entry
http://www.osvdb.org/28683 vdb entry
http://www.osvdb.org/28684 vdb entry
http://www.osvdb.org/28688 vdb entry
http://www.osvdb.org/28685 vdb entry
http://www.osvdb.org/28711 vdb entry
http://www.osvdb.org/28687 vdb entry
http://www.osvdb.org/28707 vdb entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/27906 vdb entry
http://www.osvdb.org/28701 vdb entry
http://www.osvdb.org/28695 vdb entry
http://www.osvdb.org/28680 vdb entry
http://www.osvdb.org/28705 vdb entry
http://www.osvdb.org/28694 vdb entry

Frequently Asked Questions

What is the severity of CVE-2006-3990?
CVE-2006-3990 has been scored as a high severity vulnerability.
How to fix CVE-2006-3990?
To fix CVE-2006-3990, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2006-3990 being actively exploited in the wild?
It is possible that CVE-2006-3990 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~9% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.