CVE-2006-3695 Affecting trac package, versions <0.9.6-1


Severity

Recommended
0.0
medium
0
10

Based on Debian security rating.

Threat Intelligence

EPSS
5.8% (94th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-TRAC-305416
  • published21 Jul 2006
  • disclosed21 Jul 2006

Introduced: 21 Jul 2006

CVE-2006-3695  (opens in a new tab)

How to fix?

Upgrade Debian:unstable trac to version 0.9.6-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream trac package and not the trac package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458.

CVSS Scores

version 3.1