CVE-2006-5101

N/A Unknown
Published: October 03, 2006 Modified: April 23, 2026
View on NVD

Description

PHP remote file inclusion vulnerability in include.php in Comdev CSV Importer 3.1 and possibly 4.1, as used in (1) Comdev Contact Form 3.1, (2) Comdev Customer Helpdesk 3.1, (3) Comdev Events Calendar 3.1, (4) Comdev FAQ Support 3.1, (5) Comdev Guestbook 3.1, (6) Comdev Links Directory 3.1, (7) Comdev News Publisher 3.1, (8) Comdev Newsletter 3.1, (9) Comdev Photo Gallery 3.1, (10) Comdev Vote Caster 3.1, (11) Comdev Web Blogger 3.1, and (12) Comdev eCommerce 3.1, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: it has been reported that 4.1 versions might also be affected.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/22133
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22134
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22135
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22147
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22149
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22151
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22153
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22154
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22157
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22168
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22169
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22170
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/29299
Source: cve@mitre.org
http://www.osvdb.org/29300
Source: cve@mitre.org
http://www.osvdb.org/29301
Source: cve@mitre.org
http://www.osvdb.org/29302
Source: cve@mitre.org
http://www.osvdb.org/29303
Source: cve@mitre.org
http://www.osvdb.org/29304
Source: cve@mitre.org
http://www.osvdb.org/29305
Source: cve@mitre.org
http://www.osvdb.org/29306
Source: cve@mitre.org
http://www.osvdb.org/29307
Source: cve@mitre.org
http://www.osvdb.org/29308
Source: cve@mitre.org
http://www.osvdb.org/29309
Source: cve@mitre.org
http://www.osvdb.org/29310
Source: cve@mitre.org
http://www.osvdb.org/29311
Source: cve@mitre.org
http://www.vupen.com/english/advisories/2006/3804
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3807
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3808
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3809
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3813
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3815
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22133
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22134
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22135
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22147
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22149
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22151
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22153
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22154
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22157
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22168
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22169
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22170
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityreason.com/securityalert/1658
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29299
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29300
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29301
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29302
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29303
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29304
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29305
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29306
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29307
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29308
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29309
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29310
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29311
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447184/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447185/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447186/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447187/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447188/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447190/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447192/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447193/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447194/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447201/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447207/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447209/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447213/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3803
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3804
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3805
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3806
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3807
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3808
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3809
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3810
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3811
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3812
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3813
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3814
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3815
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/29220
Source: af854a3a-2127-422b-91ae-364da2661108

106 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
5.9%
91th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

comdev