CVE-2006-4586

critical

Description

The admin panel in Tr Forum 2.0 accepts a username and password hash for authentication, which allows remote authenticated users to perform unauthorized actions, as demonstrated by modifying user settings via the id parameter to /membres/modif_profil.php, and changing a password via /membres/change_mdp.php. NOTE: this can be leveraged with other Tr Forum vulnerabilities to allow unauthenticated attackers to gain privileges.

References

https://www.exploit-db.com/exploits/2297

https://exchange.xforce.ibmcloud.com/vulnerabilities/28756

http://www.vupen.com/english/advisories/2006/3452

http://www.securityfocus.com/archive/1/445079/100/0/threaded

http://www.osvdb.org/28542

http://securitytracker.com/id?1016788

http://securityreason.com/securityalert/1508

http://secunia.com/advisories/21754

Details

Source: Mitre, NVD

Published: 2006-09-06

Updated: 2026-04-16

Risk Information

CVSS v2

Base Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.09289